Audit Events
Audit events track administrative actions and system changes.List All Audit Events
Unique event identifier
When the event occurred (ISO 8601 format)
Human-readable description of the activity
Machine-readable activity code
ID of the user who triggered the event
Name of the user who triggered the event
Email of the user who triggered the event
ID of the resource affected by the event
Additional event metadata
Activity Codes
Events are categorized by activity codes for easy filtering and monitoring.User Events
Peer Events
Policy & Rule Events
Network Events
DNS Events
Setup Key Events
Token Events
Account Events
Integration Events
Network Traffic Events
Network traffic events are a Cloud-only experimental feature that tracks network flows between peers.
List Network Traffic Events
Page number
Items per page (max 50000)
Filter by user ID
Filter by reporter (peer) ID
Filter by protocol (1=ICMP, 6=TCP, 17=UDP)
Filter by event type:
TYPE_START, TYPE_END, TYPE_DROPFilter by connection:
P2P or ROUTEDFilter by direction:
INGRESS, EGRESSSearch user email, source/destination names and addresses
Start date filter (ISO 8601)
End date filter (ISO 8601)
Reverse Proxy Access Logs
View access logs for reverse proxy services (NetBird Cloud feature).List Proxy Access Logs
Page number
Items per page (max 100)
Field to sort by:
timestamp, url, host, path, method, status_code, duration, source_ip, user_id, auth_method, reasonSort order:
asc or descGeneral search across fields
Filter by host header
Filter by HTTP method
Filter by HTTP status code
Start date filter (RFC3339 format)
End date filter (RFC3339 format)
Example
Event Monitoring Strategies
Security Monitoring
Monitor security-relevant events:Compliance Auditing
Track administrative actions:Operational Monitoring
Monitor network health:Integration Examples
SIEM Integration
Forward events to your SIEM:Webhook Notifications
Send critical events to Slack/Discord:Best Practices
Regular audits - Review audit logs regularly for suspicious activity
Alert on critical events - Set up monitoring for security-relevant changes
Retain logs - Export and archive events for compliance requirements
Filter effectively - Use activity codes to focus on relevant events
Monitor anomalies - Watch for unusual patterns in event data