What Opticon records
For each Guard API call, Guardian Bastion writes a trace to Opticon containing:- The original input (text / image / file)
- The final action and policy hits
- The masked output (only when
action == "MASK") - The tracing metadata you provide in the
opticonfield
Attach tracing metadata
Pass anopticon object in the request body:
Field guide
| Field | Purpose |
|---|---|
trace_id | Correlate with your application logs. Omit to let Guard Server generate one. |
session_id | Group a multi-turn conversation’s traces together. |
user_id | Identify the end user for per-user analysis. |
metadata | Free-form — use for environment, client version, deployment region, etc. |
tags | Filterable in Opticon dashboards. |
You never pass Opticon credentials. Opticon public/secret keys and host are managed server-side per Project — your client only provides tracing metadata.
What you don’t control
- Retention period (set by your administrator)
- Whether masked output is stored (set by the Project’s policy; Input is always stored)
- Who can view traces (IAM Policy)