Get audit log entries for a specified User
Fetch audit logs for a given user with some filtering capabilities via query params. It works best to think of this as an activity log for the specified user
Path parameters
user_id
Query parameters
filters[start_date]
Start ISO Date
filters[end_date]
End ISO Date
filters[resource_type]
Filter by Resource Type
filters[event_type]
Filter by Type of Activity
filters[team_id]
Filter by Team ID
filters[project_id]
Filter by Project ID
filters[resource_id]
Filter by resource ID (Asset ID, Project ID, User ID)
filters[user_id]
Filter by User ID
filters[ip_address]
Filter by IP Address
page
Page number
page_size
Records per page
Response
Succesful Event logs response
account_id
anonymous_user_id
client
The API client the audit event was triggered by. This will not always be populated.
When the API call that produced an event was made via an OAuth app it will look like: `oauth_app/:uuid`, and if it was made via a developer token it will look like: `user_token/:uuid`, with the UUID being the User ID the token belongs to
Here are some examples:
- `user_token/57823879-e541-49b0-b902-c43794c4400c`
- `oauth_app/80ccf0bb-ae91-49c4-8aec-8f6238c14947`
- `web/2024-06-10-18-15`
- `pipeline-media-warden/cbd0061f6f190489e8af3137b8707b33f498f53f`
- `null`
event_type
event_details
The details for the event. This varies quite a bit from one type of event to another but there are some examples in the example responses.
id
Unique identifier
inserted_at
ip_address
The IP address associated with this event
project_id
The Project ID that this action occured in
resource_id
The ID of the referenced resource
resource_type
The type of the referenced resource
team_id
Team ID
source
The Source of the action that produced a given audit log entry
Allowed values:
user_id
User ID
updated_at