Skip to main content

Audit Logs

Query the audit trail for security and compliance monitoring. Audit logs record actions such as user account changes, API key revocations, and other administrative events. These endpoints are designed for SIEM/SOAR integration.

List audit logs

GET /audit-logs

Returns a paginated, reverse-chronological list of audit log entries.

Scope: admin:audit:read · Rate limit: Standard (300 req / min)

Query parameters

ParameterTypeRequiredDescription
limitstringNoMaximum results per page (default 100, max 1000).
cursorstringNoPagination cursor from a previous response's nextCursor.
actionstringNoFilter by action type (e.g. user.disabled, api_key.revoked).
sincestring (ISO 8601)NoOnly return events that occurred after this timestamp.

Response

{
"data": [
{
"id": "019abc12-3456-7890-abcd-ef1234567890",
"action": "user.disabled",
"occurredAt": "2026-04-05T12:00:00.000Z",
"actor": {
"id": "019abc12-3456-7890-abcd-ef1234567891",
"type": "user",
"name": "Alice Johnson"
},
"targets": [
{
"id": "019abc12-3456-7890-abcd-ef1234567892",
"type": "user",
"name": "Bob Smith"
}
],
"context": {
"location": "api",
"userAgent": "curl/8.5.0"
},
"metadata": {
"reason": "Compromised credentials",
"revokedApiKeys": 2
}
}
],
"nextCursor": "019abc12-3456-7890-abcd-ef1234567899",
"totalCount": 156
}

Entry fields

FieldTypeDescription
idstring (uuid)Audit log entry ID.
actionstringAction type (e.g. user.disabled, user.enabled, api_key.revoked).
occurredAtstring (ISO 8601)When the event occurred.
actorobjectWho performed the action — contains id, type, and optionally name and metadata.
targetsarrayResources affected — each contains id, type, and optionally name and metadata.
contextobjectRequest context — location (e.g. "api", "web") and optionally userAgent.
metadataobject or absentAdditional event-specific data.

Example

Fetch audit events from the last 24 hours, filtered to user-related actions:

curl "https://<your-domain>.nomic.ai/api/v0/audit-logs?since=2026-04-04T12:00:00Z&action=user.disabled&limit=50" \
-H "Authorization: Bearer $NOMIC_API_KEY"

SIEM integration

To continuously ingest audit logs into a SIEM, poll this endpoint on a schedule (e.g. every 60 seconds) using the since parameter set to the occurredAt value of the most recently ingested entry. Use cursor to page through large result sets within each poll.