Skip to content

Logging and Monitoring

AI Controller provides logging and monitoring capabilities that allow administrators to track system activity, monitor usage patterns, troubleshoot issues, and ensure compliance with organizational policies.

Logging and Monitoring Overview

AI Controller captures the following information:

  • Request Logs: All LLM requests and responses
  • Authentication Logs: User login attempts and authentication events
  • System Logs: Administrative actions, API key usage, and system events
  • Performance Metrics: Response times, throughput, and resource utilization

This comprehensive logging approach forms a key part of how data flows through the system and supports troubleshooting, usage analysis, and performance optimization.

Key Benefits

Comprehensive Visibility

The logging system provides complete visibility into how your organization is using LLM services:

  • Track which users and applications are making requests
  • Monitor which models and providers are being used
  • Analyze request patterns and system performance
  • Identify potential security issues or anomalies

Security Auditing

Request and authentication logs provide valuable security insights:

  • Track request patterns by user
  • Monitor authentication events including login attempts
  • Detect failed login attempts and potential brute force attacks
  • Identify suspicious authentication patterns or anomalies
  • Track session creation, usage, and termination events
  • Monitor password changes and reset activities
  • Record API key authentication events
  • Support compliance requirements with comprehensive audit trails

These security logs are a critical component of AI Controller's security model and governance framework.

Performance Optimization

Monitoring helps identify and address performance issues:

  • Identify slow-performing LLM models
  • Optimize caching strategies
  • Balance load across providers
  • Detect and resolve bottlenecks
  • Plan for capacity needs

Authentication Logging

AI Controller provides comprehensive authentication event logging:

Events Captured

The authentication logging system captures:

  • Login Events: Successful and failed authentication attempts
  • Credential Management: Password changes, resets, and updates
  • API Authentication: API key usage and validation events

Security Benefits

Authentication logging provides several security advantages:

  • Intrusion Detection: Identify potential unauthorized access attempts
  • Account Security: Monitor for compromised credentials
  • Usage Patterns: Establish baselines for normal authentication behavior
  • Forensic Analysis: Investigate security incidents with detailed event timelines
  • Compliance Support: Meet regulatory requirements for access monitoring

Log Access and Retention

Authentication logs are:

  • Available to administrators in the Admin -> Logs section
  • Searchable by username, timestamp, event type, and result
  • Exportable (using datbase tools and/or external scripting) for external analysis or reporting

Cost Management

Usage analytics support cost control:

  • Track usage by user, team, or project
  • Identify high-cost use patterns
  • Optimize model selection for cost efficiency
  • Validate billing from LLM providers
  • Implement chargebacks or allocations

Troubleshooting

Request logs facilitate problem resolution:

  • Investigate failed LLM requests
  • Analyze request patterns
  • Debug request payload issues

Updated: 2025-05-27