Skip to main content

A2A Log Export

Export Agent-to-Agent (A2A) communication logs to enterprise tools for compliance, auditing, analytics, and security monitoring.

Enterprise Feature

A2A Log Export is available on Enterprise plans only.

Why Export A2A Logs?

  • Compliance: Meet regulatory requirements for AI audit trails
  • Security Monitoring: Detect anomalies in agent behavior via SIEM
  • Analytics: Build dashboards and reports on agent interactions
  • Archival: Long-term storage for data governance

Supported Destinations

DestinationUse CaseFormats
Amazon S3Data lake, archival, analyticsJSON, JSONL, Parquet
SplunkSIEM, security monitoringHEC events
DatadogObservability, APMLogs API
ElasticsearchSearch, analyticsDocuments
SyslogLegacy SIEM, network devicesRFC3164, RFC5424, CEF, LEEF
WebhookCustom integrationsJSON payloads

Export Data

Each exported message contains:

FieldDescription
ID / Message IDUnique message identifier
TimestampWhen the message was sent
Thread IDConversation thread
Tenant / Team IDOrganization and team context
Sender AgentID and name of sending agent
Receiver AgentID and name of receiving agent
Message TypeRequest, response, handoff, etc.
ContentMessage content
Content SummaryAbbreviated summary
Thread Topic / StatusThread context
Tags / PriorityClassification metadata
MetadataTool calls, handoff details

Filtering

Control which A2A communications are exported:

FilterDescription
Team IDsExport only from specific teams
Agent IDsExport only from specific agents
Thread StatusesActive, completed, etc.
Message TypesRequest, handoff, etc.
KeywordsContent keyword matching
Min PriorityPriority threshold

Batching & Delivery

SettingDescription
Batch SizeMessages per batch (1-10,000)
Flush IntervalTime between flushes (e.g., 30 seconds)
Max RetriesRetry count for failed deliveries (default: 3)
Retry DelayDelay between retries with exponential backoff

Delivery guarantee: At-least-once delivery (messages may be delivered multiple times on retry). Messages within a batch are ordered by timestamp.

SIEM Format Support

FormatCompatible With
CEF (Common Event Format)ArcSight, Splunk
LEEF (Log Event Extended Format)IBM QRadar
RFC5424Standard syslog receivers

Security Considerations

  • Credentials: Encrypted at rest; API responses mask sensitive fields
  • Network: Use TLS for all connections; configure firewall rules for MeetLoyd IP ranges
  • Data Privacy: Consider filtering PII, using content summaries, and applying retention policies at the destination

Troubleshooting

ErrorResolution
Connection refusedVerify firewall rules allow MeetLoyd IPs. Check destination service is running. Verify TLS certificates.
401 UnauthorizedVerify credentials are correct. Check token has not expired. Ensure API key has write permissions.
429 Too Many RequestsIncrease flush interval. Increase batch size. Contact destination provider for rate limit increases.

Feature Availability

FeatureEnterprise
Export DestinationsUp to 10
S3 ExportYes
Splunk ExportYes
Datadog ExportYes
Elasticsearch ExportYes
Syslog ExportYes
Webhook ExportYes
Custom FiltersYes
Parquet FormatYes
SIEM Formats (CEF/LEEF)Yes

SIEM Integration
Security event export
Audit Logs
Platform activity logging
Agent-to-Agent
A2A communication