Depends on: OAII Base Model — Common Types v0.1; OAII Base Model — World v0.1.1; OAII Base Model — Event v0.1.1; OAII Base Model — Knowledge v0.1; OAII Base Model — Policy v0.1; OAII Base Model — Agent v0.1
1. Purpose
The Log object provides an explicit, structured, and privacy-aware record of system activity within a World. Logs enable auditability, accountability, debugging, and review without requiring continuous data retention or surveillance.
In the OAII Base Model, Logs are first-class objects designed to support trust, not monitoring.
2. Definition (Normative)
A Log is an abstract record object that:
- MUST be scoped to a specific World;
- MUST record references to actions, decisions, or lifecycle changes of other objects;
- MUST NOT require retention of raw Signals unless explicitly permitted by Policy;
- MUST support redaction, summarization, and aging;
- MUST be inspectable and exportable subject to privacy constraints.
A Log is not a data lake, surveillance archive, or implicit telemetry stream.
3. Scope and Non‑Scope
In Scope:
- Event lifecycle transitions
- Policy evaluations and enforcement outcomes
- Agent decisions and actions
- Knowledge creation and revision
- Device and Sensor health state changes
Out of Scope:
- Continuous raw sensor recording
- Undifferentiated telemetry dumps
- Behavioral profiling archives
- Cross‑World aggregation without mediation
4. Core Responsibilities
The Log object:
- Provides traceability across Events, Knowledge, Policies, and Agents;
- Supports accountability through explicit references and timestamps;
- Respects privacy by defaulting to references and summaries;
- Enables review by humans or systems without exposing raw data;
- Supports lifecycle management (retention, redaction, deletion).
5. Required Attributes (Abstract)
A conforming Log MUST expose the following attributes using shared types from Common Types v0.1.
5.1 Identity and Context
- log_id : LogId
- world_ref : WorldId
5.2 Log Classification
- log_type : string
Examples: event_log, policy_log, agent_log, system_log, audit_log.
5.3 Temporal Reference
- temporal_extent : ParameterSet
Time or interval covered by the Log entry or segment.
5.4 Referenced Objects
- object_refs : string[1..N]
References to Events, Knowledge, Policies, Agents, Devices, or Sensors.
5.5 Content Representation
- log_payload : ParameterSet
Structured summary or metadata (not raw Signals by default).
5.6 Privacy and Access
- privacy_class : PrivacyClass
- access_class : AccessClass
6. Log States (Normative)
A Log MUST support at least the following states:
- ACTIVE: accepting new entries
- SEALED: closed to modification
- REDACTED: content reduced per Policy
- ARCHIVED: retained but not active
- DELETED: removed per Policy
State transitions MUST be explicit and recorded.
7. Log Mechanism Bundle
Log creation, sealing, and redaction MUST be represented using a mechanism bundle:
- log_mechanism_id : MechanismId
- log_mechanism_params : ParameterSet
- log_mechanism_result : ResultSet (optional)
This bundle documents how logging behavior is implemented without mandating a storage technology.
8. Relationships to Other Objects
- World scopes Log meaning and retention
- Events generate lifecycle entries
- Policies govern what is logged and retained
- Agents generate decision and action records
- Knowledge revisions are logged for continuity
- Devices/Sensors may emit health or status logs
Logs MUST NOT be used to bypass Policy restrictions.
9. Methods (Normative, Abstract)
To standardize behavior, a conforming Log SHOULD support the following abstract methods:
9.1 append_entry
- method_params : ParameterSet (object refs, summary payload)
- method_result : ResultSet
9.2 seal_log
- method_params : ParameterSet
- method_result : ResultSet
9.3 redact_log
- method_params : ParameterSet (redaction rules)
- method_result : ResultSet
9.4 export_log
- method_params : ParameterSet (scope, format)
- method_result : ResultSet
Export MUST respect privacy_class and access_class constraints.
10. Edge‑Primary Constraints
In Edge‑primary systems, Logs:
- MUST be storable locally;
- SHOULD support bounded size and rotation;
- MAY export summaries rather than full logs;
- MUST continue functioning during network outages.
11. Failure and Degradation Modes
Log degradation may include:
- storage exhaustion
- partial corruption
- forced redaction due to policy change
Systems MUST prefer data minimization over unsafe retention.
12. Notes for Implementers (Non‑Normative)
- Logs should reference objects by ID rather than duplicate content.
- Audit logs may require stronger immutability guarantees than operational logs.
- For aging‑in‑place, logs should prioritize explainability over completeness.
Status: Draft v0.1 (Normative Object Definition)

Leave a comment