AGF

Agentic Observability

The unified monitoring, detection, and response layer — a SIEM pattern for agentic systems.

Agentic Observability is the unified monitoring, detection, and response layer for governed agentic systems. It serves three roles simultaneously: quality monitoring (Ring 3 intelligence), security detection and response, and governance compliance verification.

Why Unified?

The landscape separates security monitoring (SIEM), quality monitoring (LLM observability tools), and compliance monitoring (GRC platforms) into different tools with different event streams. But agentic threats traverse all three domains — a prompt injection is a security event that causes a quality degradation that creates a compliance violation.

AGF unifies them. One event stream, one correlation engine, three detection perspectives.

The SIEM Pattern for Agents

Event Flow — Agentic Observability Architecture

Event Architecture

Every ring emits structured events through Event-Driven Observability (#10). The canonical event envelope includes:

  • Identity context — who (agent ID, version, configuration hash)
  • Ring context — which ring, which stage in the pipeline
  • Temporal context — timestamps, duration, sequence
  • Semantic context — what happened, structured payload
  • Governance context — policy evaluated, gate outcome, trust level

Built on OpenTelemetry GenAI Semantic Conventions with governance-specific extensions.

Correlation Engine

Three detection perspectives operate on the same event stream:

PerspectiveWhat It DetectsTime Horizon
QualityDegraded output quality, validation failures, convergence issuesReal-time + trending
SecurityPrompt injection, data exfiltration, privilege escalation, behavioral anomaliesSub-second (sentinels) + hours (analysis)
GovernancePolicy violations, unauthorized actions, missing approvals, trust level driftPer-workflow + periodic audit

Dual-Speed Detection

  • Fast-path sentinels — sub-second pattern matching for known attack signatures. Triggers the Security Response Bus for immediate containment.
  • Slow-path analysis — hours to days of behavioral pattern analysis. Detects drift, emerging threats, and systemic quality trends.

Operational Playbooks

The Observability Profile defines structured response procedures for:

  • Quality incidents — output degradation, verification failures, convergence issues
  • Security incidents — detected attacks, containment, forensic investigation
  • Governance incidents — policy violations, unauthorized actions, evidence preservation

Each playbook maps to specific ring signals and event patterns.

For the complete observability specification, see the canonical source.

On this page