Skip to main content
Export Policy Gateway events as OTLP log records to any compatible collector — Grafana, Honeycomb, New Relic, Jaeger, the OpenTelemetry Collector itself. Two transports are supported — pick one when creating the connector.

OTLP / HTTP

FieldValue
TypeOpenTelemetry (HTTP)
Collector Endpointe.g. https://collector:4318/v1/logs (default OTLP/HTTP port is 4318)
Auth HeadersMap, masked in console. e.g. Authorization: Basic ...
Service NameDefault policy-gateway
Verify TLSOn by default
Timeout (s)Default 10

OTLP / gRPC

FieldValue
TypeOpenTelemetry (gRPC)
Collector Endpointe.g. collector:4317 (default OTLP/gRPC port is 4317)
Auth HeadersSame as HTTP
Service NameDefault policy-gateway
TLSOn by default
Verify TLSOn by default
Timeout (s)Default 10

Mapping

Each audit field becomes an attribute on the LogRecord:
Audit fieldOTLP attribute
event_idevent.id
event_typeevent.type
policy_idabliteration.policy_id
decisionabliteration.decision
effective_decisionabliteration.effective_decision
enforcedabliteration.enforced
rollout_modeabliteration.rollout_mode
reason_codeabliteration.reason_code
policy_targetabliteration.policy_target
project_idabliteration.project_id
modelgen_ai.request.model
triggered_categoriesabliteration.triggered_categories
denylist_hitsabliteration.denylist_hits
allowlist_hitsabliteration.allowlist_hits
Resource attributes:
service.name       = <your configured service_name>   (default "policy-gateway")
service.namespace  = "abliteration.ai"

Verify

Filter your backend on service.name = "policy-gateway". Grafana Loki example:
{service_name="policy-gateway"} |= "REFUSE" | json
See the full field list in connectors.