Audit Logs
Audit logs give you a transparent, time-stamped record of every important action your users and the system take—helping you troubleshoot issues, meet compliance requirements, and track who did what and when. Here’s a quick guide to understanding and using the audit log screen.
Present on every module/functionality where you can edit or enter data, Perspio keeps track of every change made.
Particularly useful on checking when a Group/Dashboard/Workflow was created. by whom, and when it was updated.
Navigating to the Audit Log Screen
-
Main Menu → Administration → Audit Logs
-
Select the User, System, or Tasks tab to view the corresponding stream of events.
By default, you’ll land on the User tab, showing actions performed by individual users.
Screen Layout and Controls
Element | Description |
---|---|
Date Picker | Jump to a specific day, week (W), or month (M) |
← / → Arrows | Scroll back or forward in time |
Search Logs | Filter by keyword—email address, IP, endpoint, operation name, etc. |
Export | Download the currently visible logs as a CSV for offline analysis or archiving |
Settings (⚙️) | Configure log retention periods or enable/disable certain log categories |
Understanding the Columns
Column | What It Shows |
---|---|
Date | When the event occurred (DD/MM/YYYY HH:MM:SS ) |
User Email | The email of the user who triggered the action (or system account for automated events) |
User IP Address | The client IP (or device ID) where the action originated |
Method | The type of request or event (e.g., UserLogin , POST , DELETE , SessionExpired ) |
Endpoint | The internal API route or feature name (e.g., /users/v3/logs , /profiles/v3/share-details ) |
Status | HTTP status code for API calls (200 , 404 , 500 ) or “N/A” for non-HTTP events |
Operation | The high-level action performed (e.g., WriteAuditLog , CreateDetailsSharingProfile ) |
Common Use Cases
-
Security Auditing
-
Track all login attempts, successful or failed, and pin down suspicious IP addresses.
-
Monitor privilege escalations or role changes.
-
-
Troubleshooting & Support
-
Reproduce a user’s steps by following their endpoint calls and status codes.
-
Export a day’s worth of logs to share with engineering or for deep-dive analysis in a log-management tool.
- Verifying if log was edited/created by a User or an API/External System.
-
-
Compliance & Reporting
-
Maintain an immutable record of approvals, configuration changes, and data exports.
-
Prove to auditors that key governance processes are enforced and traceable.
-