Perform a full-text search across audit logs for specific events or changes. Allows targeted queries for compliance investigations or incident response.
curl --request POST \
--url https://api.fluxer.app/v1/admin/audit-logs/search \
--header 'Authorization: <api-key>' \
--header 'Content-Type: application/json' \
--data '
{
"query": "<string>",
"admin_user_id": "<string>",
"target_id": "<string>",
"sort_by": "createdAt",
"sort_order": "asc",
"limit": 100,
"offset": 4503599627370495
}
'{
"logs": [
{
"log_id": "<string>",
"admin_user_id": "<string>",
"target_type": "<string>",
"target_id": "<string>",
"action": "<string>",
"audit_log_reason": "<string>",
"metadata": {},
"created_at": "<string>"
}
],
"total": 123
}Admin API key: Authorization: Admin <token>. Only valid for /admin/* endpoints.
Search query string
Filter by target entity ID (user, channel, role, invite code, etc.)
Field to sort audit logs by
createdAt, relevance Sort order direction
asc, desc Maximum number of entries to return
1 <= x <= 200Number of entries to skip
0 <= x <= 9007199254740991curl --request POST \
--url https://api.fluxer.app/v1/admin/audit-logs/search \
--header 'Authorization: <api-key>' \
--header 'Content-Type: application/json' \
--data '
{
"query": "<string>",
"admin_user_id": "<string>",
"target_id": "<string>",
"sort_by": "createdAt",
"sort_order": "asc",
"limit": 100,
"offset": 4503599627370495
}
'{
"logs": [
{
"log_id": "<string>",
"admin_user_id": "<string>",
"target_type": "<string>",
"target_id": "<string>",
"action": "<string>",
"audit_log_reason": "<string>",
"metadata": {},
"created_at": "<string>"
}
],
"total": 123
}