# observability
11 articlestagged with “observability”
AI System Log Analysis
AI system logging architecture for forensic investigation: inference logs, prompt and completion logs, tool call traces, embedding query logs, and logging infrastructure requirements.
Logging and Monitoring for Cloud AI Services
Implementing comprehensive logging and monitoring for cloud AI services including prompt/response capture, anomaly detection, and security-focused observability across AWS, Azure, and GCP.
AI Monitoring and Observability
What to monitor in AI systems, key metrics for detecting abuse and drift, alerting strategies, and observability architecture for LLM applications.
Runtime Monitoring & Anomaly Detection
Monitoring LLM applications in production for token usage anomalies, output pattern detection, behavioral drift, and using tools like Langfuse, Helicone, and custom logging.
Observability for AI Infrastructure
Building observability into AI infrastructure for security monitoring and incident detection.
Exfiltrating Data Through AI Telemetry and Logging
Using AI system telemetry, logging pipelines, and observability infrastructure as covert channels for data exfiltration
AI Observability for Security
Using observability platforms to detect security anomalies in AI system behavior.
Model Telemetry Poisoning
Manipulating model telemetry and observability data to hide attacks, create false positives, or undermine monitoring effectiveness.
Production Monitoring for LLM Security Events
Walkthrough for building production monitoring systems that detect LLM security events in real time, covering log collection, anomaly detection, alert configuration, dashboard design, and incident correlation.
AI Monitoring Setup
Step-by-step walkthrough for implementing AI system monitoring: inference logging, behavioral anomaly detection, alert configuration, dashboard creation, and integration with existing SIEM platforms.
Langfuse Observability Walkthrough
Complete walkthrough for using Langfuse to monitor AI applications for security anomalies: setting up tracing, building security dashboards, detecting prompt injection patterns, and creating automated alerts.