Audit Logs

Master Control Review Surface

Loading the live local MCP snapshot. Governance Operator can review and run governed actions on Audit Logs.

Mutation enabledAudit LogsLoading SnapshotAuto 30sUpdated Awaiting first syncFallback Snapshot0/5 Live SourcesCommercial surfaces remain mock-backed
Audit Logs is in governed modeGovernance Operator can review and run privileged changes here. Mutation roles: Governance Operator / Finance Reviewer / Support Auditor.
Live Local SnapshotLoading the live local MCP snapshot.
Last update: Awaiting first live snapshotAwaiting the first live snapshot.Auto-refresh runs every 30 seconds while this tab is active.

Audit Logs

Governance audit visibility for deployment packages, rollback readiness, retirement controls, and privileged workflow continuity.

Audit Timeline

Live governance audit feed when local services respond, with fallback continuity when they do not.

6 Events
  • 01
    Break-glass request opened for Northwind StudioAdmin access package was assembled for operator review after launch-blocking DNS drift.Category: privileged-access / Severity: medium
  • 02
    Worker + Analyst lease flagged for finance reviewDelta Market requested a hybrid lease class outside the default commercial envelope.Category: ai-leasing / Severity: high
  • 03
    ACL seed package approved for Harbor GoodsSupport Auditor visibility was pre-cleared for provisioning handoff.Category: access-control / Severity: low
  • 04
    Deployment package approved for POD Engine AlphaGovernance Operator 1 and Finance Reviewer 1 approved the storefront package for prod-node-01.Category: deployment-package / Severity: medium
  • 05
    Rollback package staged for POD Engine BravoThe last certified SaaS storefront bundle remains available while provisioning is blocked on node placement.Category: rollback / Severity: medium
  • 06
    Retirement package pre-reviewed for POD Engine CharlieFinance and governance reviewers attached revocation, billing closeout, and audit retention steps.Category: retirement / Severity: high

Source Coverage

Audit confidence depends on the same live adapter health visible across the MCP.

offline
Governanceoffline

Awaiting local service response.

http://127.0.0.1:8080Latency unknown
Platform Servicesoffline

Awaiting local service response.

http://127.0.0.1:8090Latency unknown
Node Runtimeoffline

Awaiting local service response.

http://127.0.0.1:8082Latency unknown
Engine Runtimeoffline

Awaiting local service response.

http://127.0.0.1:8083Latency unknown
Integration Controloffline

Awaiting local service response.

http://127.0.0.1:8084Latency unknown

Deployment Package Summary

Who approved the package, when it was approved, and where it is assigned.

Deployment ready
Governance Operator 1 + Finance Reviewer 1
March 8, 2026 at 2:18 PM ET
prod-node-01
2026.02 storefront fallback

Bound Resources

The exact engine inputs attached to the governed deployment package.

POD Engine Alpha
  • 01
    Certified Development Layer artifact boundPOD Storefront Core 2026.03.1 was sealed into the governed package before Production Node placement.Artifact compatibility validated against the storefront engine profile.
  • 02
    AI productivity lease attachedWorker lease package was approved for merchandising productivity flows during provisioning.Lease class remains visible to finance and governance review.
  • 03
    API Services Pool package attachedCloudflare DNS, LogicBoxes registrar, and Stripe ledger integrations were bundled as a governed service package.Credential masking remains intact while package scope stays visible.
  • 04
    Client theme package lockedThe engine will launch with the approved Acme native theme and engine-local branding assets.Theme scope remains presentation-only.

Package Audit Trace

Package-scoped lifecycle events connected to deployment, rollback, or retirement review.

1 Events
  • 01
    Deployment package approved for POD Engine AlphaGovernance Operator 1 and Finance Reviewer 1 approved the storefront package for prod-node-01.Category: deployment-package / Severity: medium

Rollback Readiness

The rollback path stays attached to the same governed package and release history.

Rollback Plan
  • 01
    Revert to 2026.02 storefront packageIf release health regresses, operators can restore the last certified storefront artifact and reuse the prior AI/API bundle.Rollback requires governance reason capture before execution.
  • 02
    Preserve DNS and certificate bindingsExisting domain, DNS, and SSL bindings remain stable during rollback unless the package manifest changes.This limits blast radius during a governed reversal.

Retirement Workflow

Package-aware retirement should revoke attached services without losing audit continuity.

Retirement Controls
  • 01
    Retirement remains disabled while engine is activeThe current package is not a retirement candidate because the engine is production healthy and serving traffic.Closeout controls stay locked until governance opens a retirement package.
  • 02
    Retention policy preattachedAudit history, billing closeout, and client control panel export rules are already listed for future review.This shortens retirement prep when the engine reaches end of life.

Lifecycle Guardrails

Cross-package controls that keep rollback and retirement decisions governed.

3 Notes
  • 01
    Deployment package approvals must name the approversEvery governed deployment package should retain the approving operator roles, the approval window, and the target Production Node assignment.This keeps package provenance visible when the engine is reviewed later.
  • 02
    Rollback stays package-basedRollback is not a loose runtime action. It should point back to the last certified artifact, lease, API package, and theme bundle that the Governance Node approved.Operators should be able to verify the exact bundle before they execute the reversal.
  • 03
    Retirement preserves audit continuityRetirement packages should revoke AI leases, API bindings, client control access, and placement reservations while preserving the engine audit history.This prevents silent teardown of governed resources.

Privileged Workflow Catalog

Role-aware operational actions that should always emit audit entries.

5 Workflows
Break-glass admin session

Open a governed admin session for a tenant when launch-blocking work requires intervention.

Required Role: Governance OperatorRequires approval and audit reason
Quota exception package

Raise a burst capacity exception before provisioning final approval.

Required Role: Governance Operator + Finance ReviewerDual approval workflow
Lease expansion override

Increase Worker AI cycle cap outside the default lease envelope.

Required Role: Governance OperatorRead-only until escalated
Rollback package approval

Authorize a governed rollback to the last certified deployment package when release health regresses.

Required Role: Governance Operator + Support AuditorRequires rollback reason and package confirmation
Engine retirement package

Retire an engine with explicit revocation of AI leases, API services, and client control access.

Required Role: Governance Operator + Finance ReviewerDual approval plus retention checklist