Skip to content
English
  • There are no suggestions because the search field is empty.

Audit Logs

Audit logs give you a transparent, time-stamped record of every important action your users and the system take—helping you troubleshoot issues, meet compliance requirements, and track who did what and when. Here’s a quick guide to understanding and using the audit log screen.

Present on every module/functionality where you can edit or enter data, Perspio keeps track of every change made.

Particularly useful on checking when a Group/Dashboard/Workflow was created. by whom, and when it was updated.

 

Navigating to the Audit Log Screen

  1. Main MenuAdministrationAudit Logs

  2. Select the User, System, or Tasks tab to view the corresponding stream of events.

By default, you’ll land on the User tab, showing actions performed by individual users.

 


Screen Layout and Controls

Element Description
Date Picker Jump to a specific day, week (W), or month (M)
← / → Arrows Scroll back or forward in time
Search Logs Filter by keyword—email address, IP, endpoint, operation name, etc.
Export Download the currently visible logs as a CSV for offline analysis or archiving
Settings (⚙️) Configure log retention periods or enable/disable certain log categories
 

Understanding the Columns

Column What It Shows
Date When the event occurred (DD/MM/YYYY HH:MM:SS)
User Email The email of the user who triggered the action (or system account for automated events)
User IP Address The client IP (or device ID) where the action originated
Method The type of request or event (e.g., UserLogin, POST, DELETE, SessionExpired)
Endpoint The internal API route or feature name (e.g., /users/v3/logs, /profiles/v3/share-details)
Status HTTP status code for API calls (200, 404, 500) or “N/A” for non-HTTP events
Operation The high-level action performed (e.g., WriteAuditLog, CreateDetailsSharingProfile)
 

Common Use Cases

  • Security Auditing

    • Track all login attempts, successful or failed, and pin down suspicious IP addresses.

    • Monitor privilege escalations or role changes.

  • Troubleshooting & Support

    • Reproduce a user’s steps by following their endpoint calls and status codes.

    • Export a day’s worth of logs to share with engineering or for deep-dive analysis in a log-management tool.

    • Verifying if log was edited/created by a User or an API/External System.
  • Compliance & Reporting

    • Maintain an immutable record of approvals, configuration changes, and data exports.

    • Prove to auditors that key governance processes are enforced and traceable.