Skip to main content
GET
/
v1
/
governance
/
audit-logs
/
{id}
Get audit log by ID
curl --request GET \
  --url https://matcher.sandbox.lerian.net/v1/governance/audit-logs/{id} \
  --header 'Authorization: Bearer <token>'
{
  "action": "CREATE",
  "actorId": "[email protected]",
  "changes": [
    123
  ],
  "createdAt": "2025-01-15T10:30:00.000Z",
  "entityId": "550e8400-e29b-41d4-a716-446655440002",
  "entityType": "reconciliation_context",
  "id": "550e8400-e29b-41d4-a716-446655440000",
  "tenantId": "550e8400-e29b-41d4-a716-446655440001"
}

Authorizations

Authorization
string
header
required

Bearer token authentication (format: "Bearer {token}")

Headers

X-Request-Id
string

A unique identifier for tracing the request across services.

Path Parameters

id
string<uuid>
required

Audit Log ID

Response

Indicates that the request was successful and the response contains the expected data.

Immutable audit log entry for governance tracking

action
string

Action that was performed

Example:

"CREATE"

actorId
string

ID of the actor who performed the action

changes
integer[]

Changes made to the entity

createdAt
string

Creation timestamp in RFC3339 format

Example:

"2025-01-15T10:30:00.000Z"

entityId
string

ID of the entity that was modified

Example:

"550e8400-e29b-41d4-a716-446655440002"

entityType
string

Type of entity that was modified

Example:

"reconciliation_context"

id
string

Unique identifier for the audit log entry

Example:

"550e8400-e29b-41d4-a716-446655440000"

tenantId
string

Tenant ID that owns this audit log entry

Example:

"550e8400-e29b-41d4-a716-446655440001"