Audit

View as Markdown

Chaser provides an account-scoped audit event stream for tracking lifecycle actions.

Query audit events

$curl -sS "$CHASER_API_URL/v1/audit/events?action=workspace.create&limit=20" \
> -H "Authorization: Bearer $CHASER_API_KEY" \
> -H "X-Chaser-Account: Acme Engineering" | jq

Query parameters

ParameterDescription
actionFilter by action (e.g., session.create, workspace.delete)
resource_typeFilter by resource type (e.g., workspace, session)
resource_idFilter by specific resource ID
statusFilter by status (success or failure)
beforeRFC 3339 cursor timestamp for pagination
limitMax events to return (default 100, max 500)

Event shape

Each event includes:

FieldDescription
idEvent ID
actor_typeWho performed the action
actor_idActor identifier
actionAction performed
resource_typeType of resource affected
resource_idAffected resource ID
statussuccess or failure
summaryHuman-readable description
metadataAdditional context
created_atTimestamp

Tracked actions

ActionDescription
session.createSession created
session.terminateSession terminated
session.execCommand executed
workspace.createWorkspace created
workspace.deleteWorkspace deleted
workspace.name.updateWorkspace renamed
workspace.template.updateTemplate mode changed
workspace.snapshot.createSnapshot created
workspace.snapshot.restoreSnapshot restored
workspace.snapshot.deleteSnapshot deleted
api_key.createAPI key created
api_key.revokeAPI key revoked
billing.account.updateBilling configuration updated
billing.checkout.createCheckout session created

Notes

  • Events are scoped to the active account selected by X-Chaser-Account
  • Scoped API keys must include audit.read to access this endpoint
  • Service account keys can read audit events when granted audit.read