IW_ELK_URL is not set, it is entirely inactive with zero overhead.
Install the plugin
httpx dependency for HTTP log shipping. The base pip install inferwall does not include it.
Set IW_ELK_URL
Point the plugin at your Logstash HTTP input endpoint:That’s the only configuration required. InferenceWall reads this variable at startup and enables the plugin automatically.
Start InferenceWall
What gets shipped
Scan logs
Everyscan_input and scan_output call ships this JSON payload:
Audit events
Authentication, policy, and configuration changes ship this payload:| Category | Examples |
|---|---|
auth | Login attempts, key validation failures |
policy | Policy loads, mode changes |
config | Environment variable changes at runtime |
signatures | Catalog reloads, override registrations |
engines | Engine initialization, model loads |
admin | Admin API calls |
rate_limit | Rate limit hits |
lifecycle | Server start, shutdown, health state changes |
scan | High-severity scan decisions (supplemental to scan logs) |
Configuration
| Variable | Description | Default |
|---|---|---|
IW_ELK_URL | Logstash HTTP input endpoint | Not set (plugin disabled) |
Architecture
The plugin uses a fire-and-forget model:- Each log event is sent via
httpx.post()with a 5-second timeout. - Shipping runs after the scan response is returned to the caller — it never blocks the scan pipeline.
- All network errors and timeouts are silently suppressed. If Logstash is unreachable, logs are dropped without affecting scan latency or availability.
Logstash pipeline
Minimal Logstash pipeline to receive InferenceWall logs and forward them to Elasticsearch:Docker
Run InferenceWall with ELK shipping enabled by passingIW_ELK_URL as an environment variable:
Use cases
- Compliance (SOC2, ISO27001) — centralized audit trail of all scan decisions and configuration changes
- Threat monitoring — Kibana dashboard showing block rate trends and top triggered signatures
- Incident response — correlate LLM firewall events with other security logs by
request_idandtimestamp - Tuning — identify high false-positive signatures by querying for
decision: flagevents with known-benign inputs