Skip to content
Cisco AI Defense logo
CiscoAI Security

Observability overview — DefenseClaw

Overview

Observability in DefenseClaw has three layers, emitted in parallel:

  1. Audit store — authoritative, persisted SQLite database of every decision, verdict, and action.
  2. JSONL local log — append-only structured events on disk, readable by Splunk Universal Forwarder and jq.
  3. OTel + audit sinks — OpenTelemetry traces/metrics plus audit-event delivery to Splunk HEC, OTLP logs, or HTTP JSONL.

The streams share correlation and provenance fields, but they are not identical copies: the audit bridge translates persisted audit rows into lifecycle JSONL events, while native guardrail/judge/scan emitters write richer structured rows directly.

Section map

PagePurpose
OTEL specSpan/metric names, attributes, resource conventions
Audit storeThe SQLite schema, querying, and export paths
Audit bridgeTranslating audit rows into gatewaylog lifecycle events
Gateway JSONL logOn-disk structured log, rotation, schema
SinksAudit sink catalog and per-kind config
Webhook dispatcherQueueing, retry, HMAC signing
RedactionWhat is and isn't scrubbed before egress
Splunk appCisco DefenseClaw Splunk app overview
TroubleshootingCommon signal-drop scenarios

Related