Kaiten
Guides

Audit Trail

Feature audit trail for entitlement operations per instance.

Audit Trail Guide

Kaiten maintains an append-only audit trail for entitlement and feature flag operations per instance.

What's Tracked

EventStatusDescription
kaiten.v1.entitlement.value.getACCEPTEDAn entitlement value was read
kaiten.v1.entitlement.usage.report.acceptedACCEPTEDUsage report was accepted
kaiten.v1.entitlement.usage.report.rejectedREJECTEDUsage report was rejected (threshold exceeded)
kaiten.v1.feature_flag.evaluateACCEPTEDFeature flag was evaluated

Querying the Audit Trail

GET /api/instances/{instanceSlug}/audit-trails

Query Parameters

ParameterTypeDescription
event_namestringFilter by event name
afterRFC3339Start of time range
beforeRFC3339End of time range
limitinteger (1-200)Results per page
offsetintegerPagination offset

Example

curl "http://localhost:6000/api/instances/acme-production/audit-trails?event_name=kaiten.v1.entitlement.usage.report.accepted&limit=10" \
  -H "Authorization: Bearer ksh_xxx"

Use Cases

  • Compliance auditing — prove what entitlements were checked and when
  • Usage debugging — identify why a usage limit was hit
  • Feature flag debugging — see how flags were evaluated for a specific instance
  • Billing verification — cross-reference usage reports with your billing system

Audit Trail vs Domain Events

The audit trail is a read-side log (per instance), while domain events are a write-side pipeline (per organization). Use audit trails for instance-level forensics; use webhooks for real-time integration.

On this page