Skip to content

Observability / SIEM

Every governed call, detection, policy verdict, and tool invocation is written to the TapPass audit trail. Ship it downstream so it lives alongside the rest of your security telemetry.

DestinationFormatGo to
Splunk HECCEF or JSONSplunk HEC
Azure SentinelLog Analytics HTTP Data CollectorAzure Sentinel
Generic webhookJSONWebhooks
audit events ──▶ format (CEF | JSON) ──▶ filter ──▶ redact ──▶ destination
  • Format — CEF for SIEMs that parse it natively (Splunk, ArcSight, QRadar); JSON for everything else.
  • Filter — severity, agent, time window, event kind.
  • Redact — strip PII before export (emails, SSNs, credit cards).
  • Batching — all destinations support batch mode; tune in config/observability.yaml.
config/observability.yaml
exports:
- name: security-splunk
destination: splunk_hec
format: cef
splunk:
url: https://splunk.example.com:8088/services/collector
hec_token: "${SPLUNK_HEC_TOKEN}"
sourcetype: "tappass:cef"
filters:
min_severity: warn
event_kinds: [detection, policy_block, auth_fail]

Each audit event contains:

FieldTypeDescription
audit_idstringGlobally unique event ID
timestampRFC3339Event time
event_kindenumchat, tool_call, detection, policy_block, auth_fail, …
agent_idstringThe agent that triggered the event
session_idstringGroups multi-turn interactions
providerstringLLM or data provider involved
modelstringModel name, when relevant
detectionslistPII / prompt injection findings with category + severity
policy_resultobjectallow / deny, which rule fired
severityenuminfo, warn, error, critical
costobjectToken counts + $ estimate

Full schema in schemas/audit-event.json.

  • Datadog (HTTP intake)
  • Elastic (HTTPS bulk)
  • CloudWatch Logs (AWS SDK)
  • Grafana Loki (Loki HTTP API)

Ping support@tappass.ai if you need one urgently.