List all audit log entries for an organization with flexible filtering options. Useful for compliance, debugging, and understanding system changes.
organization_id string required
The unique identifier of the organization.
resourceType string optional
Filter by resource type. Values: assistant, thread, vector_store, rule, mcp_configuration, user, organization.
resourceId string optional
Filter by specific resource ID.
action string optional
Filter by action type. Values: created, updated, deleted, accessed, shared, archived.
userId string optional
Filter by user who performed the action.
startDate string optional
Filter logs from this date (ISO 8601 format).
endDate string optional
Filter logs until this date (ISO 8601 format).
limit integer optional · Defaults to 50
Number of logs to return per page. Maximum: 100.
offset integer optional · Defaults to 0
Number of logs to skip for pagination.
- Bash
- Python
- JavaScript
curl "https://api.freddy.aitronos.com/v1/org_abc123/audit-logs?limit=20" \
-H "Authorization: Bearer $FREDDY_API_KEY"{
"auditLogs": [
{
"id": "log_abc123",
"timestamp": "2025-01-20T10:30:00Z",
"resourceType": "assistant",
"resourceId": "asst_abc123",
"resourceName": "Customer Support Bot",
"action": "updated",
"userId": "uid_user123",
"userName": "John Doe",
"userEmail": "john@example.com",
"changes": [
{
"field": "temperature",
"oldValue": 0.7,
"newValue": 0.9
},
{
"field": "tools.webSearch",
"oldValue": false,
"newValue": true
},
{
"field": "instructions",
"oldValue": "You are a helpful assistant.",
"newValue": "You are a helpful customer support assistant."
}
],
"metadata": {
"ipAddress": "192.168.1.1",
"userAgent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7)",
"source": "web_ui"
}
},
{
"id": "log_def456",
"timestamp": "2025-01-20T09:15:00Z",
"resourceType": "thread",
"resourceId": "thread_xyz789",
"resourceName": "Customer Inquiry #1234",
"action": "created",
"userId": "uid_user456",
"userName": "Jane Smith",
"userEmail": "jane@example.com",
"changes": [],
"metadata": {
"ipAddress": "192.168.1.2",
"userAgent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64)",
"source": "api"
}
}
],
"pagination": {
"total": 150,
"limit": 50,
"offset": 0,
"hasMore": true
}
}- JSON
- JSON
- JSON
{
"error": {
"message": "Organization not found",
"type": "not_found_error",
"code": "organization_not_found"
}
}For convenience, you can also use resource-specific endpoints:
- Assistants:
GET /v1/assistants/{assistant_id}/history - Threads:
GET /v1/threads/{thread_id}/history - Vector Stores:
GET /v1/vector-stores/{store_id}/history - Rules:
GET /v1/rules/{rule_id}/history - MCP Configurations:
GET /v1/mcp-configurations/{config_id}/history
These endpoints automatically filter by resource type and ID.
Track all changes for regulatory compliance and security audits.
Understand what changed when troubleshooting issues.
Monitor user actions and identify suspicious behavior.
Review changes before implementing rollback functionality.