You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Analyzed 82 downloaded workflow runs from the last 7 days, with coverage metrics calculated across 77 completed runs. The downloader returned 77 completed runs before the bridge timeout limit; in-progress runs were excluded from missing-artifact criticals because final log upload may still be pending.
AWF Firewall observability is 100% across 7 firewall-enabled completed runs. MCP telemetry file coverage is 100% across 8 MCP-enabled completed runs, with observed MCP telemetry coming from the canonical rpc-messages.jsonl fallback rather than gateway.jsonl.
Key Alerts and Anomalies
🔴 Critical Issues:
No critical issues detected.
⚠️Warnings:
MCP telemetry file is present but empty or has parse issues for §25347551171 (Smoke Pi).
MCP telemetry file is present but empty or has parse issues for §25347488563 (Auto-Triage Issues).
MCP telemetry file is present but empty or has parse issues for §25343896484 (Contribution Check).
7 firewall-enabled runs had non-empty Squid access logs, and 5 MCP-enabled runs had non-empty, parse-clean telemetry. Empty rpc-messages files were treated as warnings, not criticals, because the telemetry artifact exists but does not provide useful per-call debugging detail.
Recommended Actions
Keep publishing sandbox/firewall/logs/access.log for all firewall-enabled workflows and document this current artifact path in the observability runbook.
Continue accepting rpc-messages.jsonl as MCP telemetry, but investigate whether preferred structured gateway.jsonl emission should be restored.
Review the blocked-request hotspots in Smoke Pi and Daily Regulatory Report Generator to decide whether the blocks are expected policy enforcement or workflow configuration drift.
📊 Historical Trends
No historical baseline file was available in this run. This report records the current sample as a baseline: firewall coverage 100%, MCP telemetry file coverage 100%.
Report generated automatically by the Daily Observability Report workflow Analysis window: Last 7 days | Runs analyzed: 82 downloaded (77 completed)
Warning
Firewall blocked 4 domains
The following domains were blocked by the firewall during workflow execution:
ab.chatgpt.com
api.github.com
chatgpt.com
github.com
💡 Tip:api.github.com is blocked because GitHub API access uses the built-in GitHub tools by default. Instead of adding api.github.com to network.allowed, use tools.github.mode: gh-proxy for direct pre-authenticated GitHub CLI access without requiring network access to api.github.com:
tools:
github:
mode: gh-proxy
See GitHub Tools for more information on gh-proxy mode.
To allow these domains, add them to the network.allowed list in your workflow frontmatter:
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
-
Executive Summary
Analyzed 82 downloaded workflow runs from the last 7 days, with coverage metrics calculated across 77 completed runs. The downloader returned 77 completed runs before the bridge timeout limit; in-progress runs were excluded from missing-artifact criticals because final log upload may still be pending.
AWF Firewall observability is 100% across 7 firewall-enabled completed runs. MCP telemetry file coverage is 100% across 8 MCP-enabled completed runs, with observed MCP telemetry coming from the canonical
rpc-messages.jsonlfallback rather thangateway.jsonl.Key Alerts and Anomalies
🔴 Critical Issues:
Coverage Summary
📋 Detailed Run Analysis
Firewall-Enabled Runs
Missing Firewall Logs (access.log)
None.
MCP-Enabled Runs
Missing MCP Telemetry (no gateway.jsonl or rpc-messages.jsonl)
None.
🔍 Telemetry Quality Analysis
Firewall Log Quality
Gateway Log Quality
Healthy Runs Summary
7 firewall-enabled runs had non-empty Squid access logs, and 5 MCP-enabled runs had non-empty, parse-clean telemetry. Empty rpc-messages files were treated as warnings, not criticals, because the telemetry artifact exists but does not provide useful per-call debugging detail.
Recommended Actions
sandbox/firewall/logs/access.logfor all firewall-enabled workflows and document this current artifact path in the observability runbook.rpc-messages.jsonlas MCP telemetry, but investigate whether preferred structuredgateway.jsonlemission should be restored.📊 Historical Trends
No historical baseline file was available in this run. This report records the current sample as a baseline: firewall coverage 100%, MCP telemetry file coverage 100%.
References: §25350293267, §25349690918, §25349690918
Report generated automatically by the Daily Observability Report workflow
Analysis window: Last 7 days | Runs analyzed: 82 downloaded (77 completed)
Warning
Firewall blocked 4 domains
The following domains were blocked by the firewall during workflow execution:
ab.chatgpt.comapi.github.comchatgpt.comgithub.com💡 Tip:
api.github.comis blocked because GitHub API access uses the built-in GitHub tools by default. Instead of addingapi.github.comtonetwork.allowed, usetools.github.mode: gh-proxyfor direct pre-authenticated GitHub CLI access without requiring network access toapi.github.com:See GitHub Tools for more information on
gh-proxymode.To allow these domains, add them to the
network.allowedlist in your workflow frontmatter:See Network Configuration for more information.
Beta Was this translation helpful? Give feedback.
All reactions