Liya Engine

Audit Log

Query immutable compliance audit log entries for your tenant.

GET /dashboard/audit

Returns paginated audit log entries for your tenant, ordered newest-first. Audit logs are immutable and tamper-evident.

GET https://api.liyaengine.ai/dashboard/audit?severity=high&flagged=true&page=1
Authorization: Bearer <jwt>

Query parameters:

ParameterTypeDescription
severitystringFilter by severity: low, medium, high, critical
actorTypestringFilter by actor: user, system, api
flaggedbooleantrue to return only flagged entries
pageintegerPage number (default: 1, page size: 25)

Response:

{
  "success": true,
  "data": {
    "entries": [
      {
        "id": "aud_01HZ...",
        "actorType": "user",
        "actorId": "dashboard_user_id",
        "action": "api_key.rotate",
        "resource": "api_key",
        "resourceId": "key_01HZ...",
        "severity": "high",
        "flagged": false,
        "metadata": {},
        "createdAt": "2026-03-14T10:00:00Z"
      },
      {
        "id": "aud_02HZ...",
        "actorType": "api",
        "actorId": "system",
        "action": "quota.exceeded",
        "resource": "usage",
        "resourceId": "",
        "severity": "critical",
        "flagged": true,
        "metadata": {
          "requestsUsed": 10000,
          "limit": 10000
        },
        "createdAt": "2026-03-13T18:22:05Z"
      }
    ]
  },
  "pagination": {
    "page": 1,
    "limit": 25,
    "total": 142,
    "totalPages": 6
  }
}

Audit log fields

FieldDescription
actorTypeWho triggered the event: user (dashboard user), api (API key caller), system (automated process)
actorIdID of the dashboard user or "system"
actionDot-separated event name (see table below)
resourceResource type affected
resourceIdID of the affected resource
severitylow, medium, high, or critical
flaggedtrue if the event was automatically flagged as anomalous
metadataStructured context specific to the event type

Common audit actions

ActionSeverityDescription
api_key.rotatehighAPI key was rotated
api_key.revokehighAPI key was manually revoked
account.config_updatemediumTenant configuration was updated
account.updatelowTenant name or billing email changed
domain.pack_updatemediumIntent permissions were updated
quota.exceededcriticalMonthly quota limit was hit
quota.warningmediumUsage reached 80% of quota
session.createdlowA new AI session was started
intent.blockedmediumA disabled intent was called
auth.loginlowDashboard login
auth.password_resetmediumPassword reset completed

Audit log retention defaults to 730 days (2 years). This can be adjusted in Data Retention settings. Audit logs cannot be deleted via the API — they are immutable for compliance purposes.

On this page