The audit logs can be filtered using a variety of parameters. Queries should be separated by and
and can utilize eq
, contains
, and in
operators to construct the final query. Each query should follow the format:
Filter parameter | Supported Operators | Type | Example |
---|---|---|---|
createdAt | lt, ge | RFC timestamp in string | createdAt ge '2024-02-16T07:54:55.0Z' |
category | eq, in | string | category eq 'User Management' category in ('Device Management', 'User Activity') |
description | eq, contains | string | contains(description, 'Logged in') description eq 'User test@test.com logged in via ping mode.' |
additionalInfo/ipAddress | eq, contains | IP string | additionalInfo/ipAddress eq '192.168.12.12' contains(additionalInfo/ipAddress, '192.168') |
user/username | eq, contains | email in string | user/username eq 'test@test.com' contains(user/username, '@gmail.com') |
workspace/workspaceName | eq, contains | string | workspace/workspaceName eq 'Example workspace' contains(workspace/workspaceName, 'Example') |
application/id | eq | UUID in string | application/id eq '12312-123123-123123-123121' |
region | eq | region code in string | region eq 'us-west' |
hasDetails | eq | boolean | hasDetails eq 'true' |
All audit logs.
Bad request
Unauthorized
Forbidden
Internal Server Error
{- "items": [
- {
- "id": "string",
- "type": "/audit-log/logs",
- "application": {
- "id": "string"
}, - "region": "string",
- "user": {
- "username": "string"
}, - "category": "string",
- "description": "string",
- "workspace": {
- "id": "string",
- "workspaceName": "string"
}, - "createdAt": "2019-08-24T14:15:22Z",
- "updatedAt": "2019-08-24T14:15:22Z",
- "generation": 0,
- "additionalInfo": { },
- "hasDetails": true
}
], - "count": 0,
- "offset": 0,
- "total": 0,
- "remainingRecords": true
}