Advanced Options provides access to sensitive administrative tools designed for experienced users. These tools allow direct interaction with system internals and may cause permanent changes if used incorrectly.
Advanced Options
Advanced Options provides access to sensitive administrative tools designed for experienced users. These tools allow direct interaction with system internals and may cause permanent changes if used incorrectly.
Overview
Advanced Options provides access to sensitive administrative tools designed for experienced users. These tools allow direct interaction with system internals and may cause permanent changes if used incorrectly.
Unlike other sections, Advanced Options is not a standalone page. It is accessed through a modal dialog from the Control Panel and exposes two independent utilities.
Access Model
Advanced Options is protected by role-based permissions. Only users with explicit authorization can view or interact with these tools.
- Options are opened from a modal dialog
- No direct route exists for this section
- Each tool applies its own internal validation rules
Database Management
Database Management allows authorized users to execute direct queries against the application database. This tool is intended for diagnostics, inspection, and controlled maintenance operations.
How it works- Access requires explicit database permissions
- The query editor is connected to the active database
- Queries are executed in real time
- Results are returned in tabular format
- No automatic rollback is performed
- Write operations affect live data
- Recommended primarily for read-only queries
Log Viewer
The Log Viewer provides access to application logs for monitoring, debugging, and auditing. Its behavior changes automatically depending on the logging configuration defined in the environment.
Behavior based on configuration-
Database logging
- Logs are stored in the database
- Displayed using a CRUD-style interface
- Entries can be filtered and inspected
-
Stack / file-based logging
- Logs are generated as files
- The corresponding log file is prepared for download
Environment-driven behavior
The Log Viewer adapts automatically based on the LOG_CHANNEL configuration in the .env file. No manual switching is required.
Security and Usage Guidelines
- Use Advanced Options only when necessary
- Prefer read-only operations when possible
- Limit access to trusted technical roles
- Changes made here may not be reversible
Common Use Cases
- Inspecting system data during debugging
- Reviewing logs for incident analysis
- Validating system state during maintenance
- Supporting advanced troubleshooting tasks