SigSentrySigSentry
Log Sources

GET /v1/config/log-sources

List every log source configured on the current project

Returns the log sources configured on the current project. Credentials are never returned — only metadata, the sources array, and the most recent test result.

Authentication

API key with config:read permission. Project-scoped or tenant-scoped (with X-Project-Id).

Endpoint

GET /v1/config/log-sources

Response

200 OK

{
  "success": true,
  "data": [
    {
      "id": "ls_a1b2c3d4-...",
      "tenantId": "tnt_x1y2...",
      "type": "cloudwatch",
      "name": "prod-cloudwatch",
      "sources": [
        "/aws/lambda/checkout-api",
        "/aws/lambda/billing-worker"
      ],
      "isActive": true,
      "lastTestedAt": "2026-04-25T12:00:00Z",
      "lastTestResult": {
        "success": true,
        "message": "Connected successfully"
      },
      "createdAt": "2026-04-12T09:14:00Z"
    }
  ]
}
FieldTypeNotes
idUUIDThe log source id
typestringOne of cloudwatch, datadog, loki, splunk, elastic, gcp_logging
namestringHuman-readable label
sourcesstring[]The log groups, indexes, or selectors this source queries
isActivebooleanWhen false, the source is skipped during analyses
lastTestedAtISO 8601 | nullWhen the source was last tested
lastTestResultobject | null{ success, message } from the most recent test
createdAtISO 8601When the source was created

The list is not paginated — log sources per project are bounded by your plan's logSourcesPerProject quota.

Error responses

Statuserror.codeWhen
401UNAUTHORIZEDMissing or invalid API key
403FORBIDDENKey lacks config:read

Example

curl https://api.sigsentry.com/v1/config/log-sources \
  -H "Authorization: Bearer ss_secret_..."