List Data Audit Events

Lists data audit events that match query parameters.

Authentication

AuthorizationBearer

Access token, prefixed by Bearer .

Query parameters

filterOps.context.changeIDstringOptional
ID for the audit event.
filterOps.context.requestIDstringOptional
ID for the request that caused the event.
filterOps.context.sessionIDstringOptional
ID for the session in which the request was sent.
filterOps.context.actorstringOptional

Member who sent the request. Depending on actorType, this may be a user ID or a service account ID.

filterOps.context.actorTypeenumOptional

undocumented_enums:[‘GROUP’,‘SQL_SERVICE_ACCOUNT’];Type of member who sent the request.

Allowed values:
filterOps.context.accessTypeenumOptional
Type of access for the request.
Allowed values:
filterOps.context.ipAddressstringOptional
IP Address of the client that made the request.
filterOps.context.originstringOptional

HTTP Origin request header (including scheme, hostname, and port) of the request.

filterOps.context.authModeenumOptional
Allowed values:
filterOps.context.jwtIDstringOptional
ID of the JWT token.
filterOps.context.bearerTokenContextIDstringOptional
Embedded User Context.
filterOps.parentAccountIDstringOptional
Resources with the specified parent account ID.
filterOps.accountIDstringRequired
filterOps.workspaceIDstringOptional
Resources with the specified workspace ID.
filterOps.vaultIDstringOptional
Resources with the specified vault ID.
filterOps.resourceIDsstringOptional

Resources with a specified ID. If a resource matches at least one ID, the associated event is returned. Format is a comma-separated list of “<resourceType>/<resourceID>”. For example, “VAULT/12345, USER/67890”.

Response

OK
eventlist of objects or null
Events matching the query.
nextOpsobject or null

Errors