SIEM Ingestion Quick Recipes (JSONL And OTEL)
SIEM Ingestion Quick Recipes (JSONL And OTEL)
Gait OSS does not ship a dashboard. It emits deterministic artifacts and structured exports so teams can use their existing monitoring stack.
Use gait mcp proxy export options:
--export-log-outfor normalized JSONL event stream--export-otel-outfor OTEL-style JSONL events
Generate Export Files
gait mcp proxy \
--policy examples/policy-test/allow.yaml \
--call examples/mcp/openai_function_call.json \
--adapter openai \
--trace-out ./gait-out/trace_mcp.json \
--export-log-out ./gait-out/mcp_events.jsonl \
--export-otel-out ./gait-out/mcp_otel.jsonl \
--jsonSplunk (File Monitor)
Use file monitor on gait-out/mcp_events.jsonl and parse as JSON.
Minimal inputs.conf example:
[monitor:///var/data/gait/gait-out/mcp_events.jsonl]
index = gait
sourcetype = gait:events
disabled = falseDatadog (Agent Log Collection)
Configure Datadog agent log source for JSON file:
logs:
- type: file
path: /var/data/gait/gait-out/mcp_events.jsonl
service: gait
source: gaitElastic (Filebeat)
Minimal Filebeat input:
filebeat.inputs:
- type: filestream
id: gait-events
paths:
- /var/data/gait/gait-out/mcp_events.jsonl
parsers:
- ndjson:
add_error_key: trueMapping Guidance
Recommended indexed keys:
trace_idrun_idsession_idtool_nameverdictreason_codespolicy_digestintent_digestdecision_latency_msdelegation_refdelegation_depth
This keeps SIEM queries aligned with Gait artifacts and proofs.