You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Analyzed the latest 100 agentic workflow runs from the last 7 days using the agenticworkflows logs targeted firewall/MCP artifact pass. The run set contains 7 firewall-enabled runs identified by aw_info.json; 4 are completed and eligible for final artifact checks, while 3 were still in progress when logs were fetched.
Completed firewall coverage is degraded: 3 of 4 completed firewall-enabled runs have access.log, for 75.0% coverage. Completed MCP telemetry coverage is complete by presence criteria: 3 of 3 MCP-enabled runs have rpc-messages.jsonl present, for 100.0% coverage, but one fallback log is empty and should be investigated as a quality warning.
Key Alerts and Anomalies
🔴 Critical Issues:
Smoke CI run §25702296438 is completed, has firewall_enabled: true in aw_info.json, and has no access.log artifact. This prevents normal firewall egress debugging for that run.
⚠️Warnings:
Auto-Triage Issues run §25703825374 has rpc-messages.jsonl present, but the file has 0 JSON-RPC entries. Presence satisfies MCP telemetry coverage, but the fallback log has no useful protocol detail.
Three firewall-enabled runs were still in_progress at collection time and had no final firewall artifacts yet: Daily Documentation Healer§25704595533, Daily Observability Report for AWF Firewall and MCP Gateway§25704658440, and Semantic Function Refactoring§25704640289. These were excluded from completed-run coverage percentages.
Average response time: N/A from this pass; no gateway.jsonl duration metrics were present, and response pairing was not available for the empty fallback log.
Data Collection Notes
The first broad 100-run all-artifact fetch timed out at the bridge layer, but it wrote partial artifacts locally.
A second targeted 100-run pass for firewall and MCP artifacts completed successfully and is the basis for this report.
Runs still in progress were listed separately because final artifacts may not have been uploaded yet.
Recommended Actions
Investigate why completed Smoke CI run §25702296438 has firewall_enabled: true but no access.log artifact. Confirm whether the firewall teardown/upload step skipped, failed, or ran before Squid created the file.
Inspect the MCP gateway/fallback capture path for Auto-Triage Issues run §25703825374, where rpc-messages.jsonl exists but is empty despite MCP logging artifacts being uploaded.
Prefer uploading gateway.jsonl in addition to rpc-messages.jsonl so future reports can include duration, status, and error-rate metrics without relying only on JSON-RPC fallback parsing.
Historical Trends
No prior daily trend data was available in the downloaded artifact set. This report should be treated as the baseline for subsequent observability coverage comparisons.
The following domains were blocked by the firewall during workflow execution:
api.github.com
github.com
💡 Tip:api.github.com is blocked because GitHub API access uses the built-in GitHub tools by default. Instead of adding api.github.com to network.allowed, use tools.github.mode: gh-proxy for direct pre-authenticated GitHub CLI access without requiring network access to api.github.com:
tools:
github:
mode: gh-proxy
See GitHub Tools for more information on gh-proxy mode.
To allow these domains, add them to the network.allowed list in your workflow frontmatter:
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
Uh oh!
There was an error while loading. Please reload this page.
-
Executive Summary
Analyzed the latest 100 agentic workflow runs from the last 7 days using the
agenticworkflows logstargeted firewall/MCP artifact pass. The run set contains 7 firewall-enabled runs identified byaw_info.json; 4 are completed and eligible for final artifact checks, while 3 were still in progress when logs were fetched.Completed firewall coverage is degraded: 3 of 4 completed firewall-enabled runs have
access.log, for 75.0% coverage. Completed MCP telemetry coverage is complete by presence criteria: 3 of 3 MCP-enabled runs haverpc-messages.jsonlpresent, for 100.0% coverage, but one fallback log is empty and should be investigated as a quality warning.Key Alerts and Anomalies
🔴 Critical Issues:
Smoke CIrun §25702296438 is completed, hasfirewall_enabled: trueinaw_info.json, and has noaccess.logartifact. This prevents normal firewall egress debugging for that run.Auto-Triage Issuesrun §25703825374 hasrpc-messages.jsonlpresent, but the file has 0 JSON-RPC entries. Presence satisfies MCP telemetry coverage, but the fallback log has no useful protocol detail.in_progressat collection time and had no final firewall artifacts yet:Daily Documentation Healer§25704595533,Daily Observability Report for AWF Firewall and MCP Gateway§25704658440, andSemantic Function Refactoring§25704640289. These were excluded from completed-run coverage percentages.Coverage Summary
access.log)gateway.jsonlorrpc-messages.jsonl)Detailed Run Analysis
Firewall-Enabled Runs
access.logMissing Firewall Logs (
access.log)MCP-Enabled Runs
rpc-messages.jsonlrpc-messages.jsonlrpc-messages.jsonlMissing MCP Telemetry
No completed MCP-enabled runs were missing both
gateway.jsonlandrpc-messages.jsonl.Telemetry Quality Analysis
Firewall Log Quality
api.anthropic.com:443(15),api.githubcopilot.com:443(8),github.com:443(2)transaction-end-before-headersnoise; the egress counts above use realCONNECTentries.Gateway Log Quality
rpc-messages.jsonlcanonical fallbackgateway.jsonlfiles observed: 0safeoutputs,githubgateway.jsonlduration metrics were present, and response pairing was not available for the empty fallback log.Data Collection Notes
Recommended Actions
Smoke CIrun §25702296438 hasfirewall_enabled: truebut noaccess.logartifact. Confirm whether the firewall teardown/upload step skipped, failed, or ran before Squid created the file.Auto-Triage Issuesrun §25703825374, whererpc-messages.jsonlexists but is empty despite MCP logging artifacts being uploaded.gateway.jsonlin addition torpc-messages.jsonlso future reports can include duration, status, and error-rate metrics without relying only on JSON-RPC fallback parsing.Historical Trends
No prior daily trend data was available in the downloaded artifact set. This report should be treated as the baseline for subsequent observability coverage comparisons.
References: §25702296438, §25704013750, §25703825374
Warning
Firewall blocked 2 domains
The following domains were blocked by the firewall during workflow execution:
api.github.comgithub.com💡 Tip:
api.github.comis blocked because GitHub API access uses the built-in GitHub tools by default. Instead of addingapi.github.comtonetwork.allowed, usetools.github.mode: gh-proxyfor direct pre-authenticated GitHub CLI access without requiring network access toapi.github.com:See GitHub Tools for more information on
gh-proxymode.To allow these domains, add them to the
network.allowedlist in your workflow frontmatter:See Network Configuration for more information.
Beta Was this translation helpful? Give feedback.
All reactions