Skip to content

Audit Logging

Transyt maintains a comprehensive audit log of all administrative actions, designed to support SOC 2 compliance requirements.

Every Admin API request is logged with:

FieldDescription
ActorWho performed the action (identified by token or IP)
ActionWhat was done (e.g., account.create, event.replay)
IP AddressSource IP of the request
TimestampWhen the action occurred
DetailsAdditional context about the action

Administrative actions that are logged include:

  • Account management — Create, update, delete provider accounts
  • Event operations — Replay, acknowledge, mark as failed
  • Destination management — Create, update, delete destinations
  • Delivery operations — Manual retry, bulk replay
  • Audit log operations — Viewing and purging logs
  • Backup operations — Triggering and listing backups
Terminal window
# View recent audit logs
curl https://ingest.transyt.com/admin/audit-logs \
-H "X-Admin-Token: YOUR_ADMIN_TOKEN"
# Filter by action type
curl "https://ingest.transyt.com/admin/audit-logs?action=event.replay" \
-H "X-Admin-Token: YOUR_ADMIN_TOKEN"
# Filter by IP address
curl "https://ingest.transyt.com/admin/audit-logs?ip_address=203.0.113.1" \
-H "X-Admin-Token: YOUR_ADMIN_TOKEN"
# Get audit log statistics
curl https://ingest.transyt.com/admin/audit-logs/stats \
-H "X-Admin-Token: YOUR_ADMIN_TOKEN"

The default retention period is 90 days. You can purge older logs via the API with a minimum retention of 7 days:

Terminal window
curl -X DELETE "https://ingest.transyt.com/admin/audit-logs?older_than_days=90" \
-H "X-Admin-Token: YOUR_ADMIN_TOKEN"

See the Audit Logs API for full details.