AuditLogEvent
AuditLogEvent represents an AuditLogEvent. It also contains the user who invoked it.
Properties
timestampinteger requiredUnix epoch timestamp (seconds) when the event occurred.sourceIPstring requiredIP address of the client that triggered the event.eventstring requiredThe audit event type identifier (e.g. ‘stack.update’, ‘member.added’).descriptionstring requiredHuman-readable description of the event.- The user who performed the action.
- ↳
namestring requiredThe user’s display name. - ↳
githubLoginstring requiredThe user’s login name. - ↳
avatarUrlstring requiredThe URL of the user’s avatar image. - ↳
emailstring optionalIMPORTANT: The email address of the user is only included on a few admin-only APIs. For nearly all APIs that return a UserInfo object, this will not be provided. considered sensitive information. tokenIDstring optionalID of the access token used to authenticate, if applicable.tokenNamestring optionalName of the access token used to authenticate, if applicable.reqOrgAdminboolean optionalWhether the action that triggered this event required the organization ADMIN role.reqStackAdminboolean optionalWhether the action required stack admin privileges.authFailureboolean optionalWhether this event represents a failed authentication attempt.actorNamestring optionalDisplay name of the non-human actor (e.g. deploy token name) that triggered the event.actorUrnstring optionalPulumi URN of the non-human actor that triggered the event.
Thank you for your feedback!
If you have a question about how to use Pulumi, reach out in Community Slack.
Open an issue on GitHub to report a problem or suggest an improvement.