Logs
Review request-level gateway activity, token usage, provider latency, status codes, and estimated cost.
Breaches
Review failed, blocked, or suspicious virtual key activity grouped by policy trigger and severity.
Inspect request logs, failed traffic, policy triggers, and breach groups.
Review request-level gateway activity, token usage, provider latency, status codes, and estimated cost.
Review failed, blocked, or suspicious virtual key activity grouped by policy trigger and severity.