The Threadline Operator Surface provides a suite of mountable, drop-in LiveView screens to investigate row mutations, actor histories, and transaction contexts directly in your host application.
It is designed to be fully optional: phoenix, phoenix_live_view, phoenix_html, and phoenix_pubsub are optional dependencies, so capture-only integrations aren't forced to bring in UI code.
For compatibility, support boundaries, and deprecation policy, see guides/upgrade-path.md. This guide stays focused on mount, auth, and screens.
For the broader composition contract across Threadline.Plug, Threadline.Job,
reference adapters, and operator-surface auth/export auth, see
guides/integration-contracts.md.
1-Minute Mount
To enable the UI, first ensure your host app has the root Threadline dependency
and the optional Phoenix surface stack that matches your host app. Keep exact
Phoenix proof pins in guides/upgrade-path.md; this guide stays on the mount,
auth, and screen contract.
def deps do
[
# ...
{:threadline, "~> 0.5"}
]
endThen, use the threadline_operator_surface/2 macro in your host application's router.
The canonical topology is one host-owned /audit mount behind your browser/auth
pipeline, with one shared authorize_fn that works for both the LiveView
surface and the export fallback:
defmodule MyAppWeb.Router do
use MyAppWeb, :router
import Threadline.OperatorSurface.Router
pipeline :admin_auth do
# You MUST provide your own pipeline to authenticate admins.
plug :require_authenticated_admin
end
scope "/audit", MyAppWeb do
pipe_through [:browser, :admin_auth]
threadline_operator_surface "/",
actor_fn: &MyApp.Audit.current_actor/1,
authorize_fn: &MyApp.Audit.authorize_operator/1,
repo: MyApp.Repo
end
endAdmin-first recipe:
- Keep
/auditbehindpipe_through [:browser, :admin_auth]. - Let
authorize_fnmake the final allow/deny decision. - Keep export routes enabled for admins unless your host wants stricter posture.
support-read-only variation:
- Reuse the same
/auditsurface and the same host auth boundary. - Return
{:ok, %{access: :support_read_only, organization_id: "org_123"}}or another host-owned scope fromauthorize_fn. - Set
exports: falseby default so support operators do not inherit download access accidentally. - Only add
export_authorize_fnlater if your host deliberately wants a narrower export-specific override.
threadline_operator_surface "/",
actor_fn: &MyApp.Audit.current_actor/1,
authorize_fn: &MyApp.Audit.authorize_operator/1,
exports: false,
repo: MyApp.RepoSecurity and Authorization (Fail-Closed Default)
Threadline adopts a fail-closed security posture by default. The threadline_operator_surface/2 macro requires a secure mount. Multi-tenancy and authorization stay host-owned.
Unless explicitly bypassed, the macro will fail at compile time unless one of the following is true:
- The route
scopehas at least onepipe_through. - The
:authorize_fnoption is provided. - The
:adopter_acknowledges_unauthenticated: trueoption is explicitly supplied (this raises in test and loudly logs a warning in prod).
:authorize_fn
The :authorize_fn callback is invoked directly as a 1-arity function. The
recommended shape is one shared callback that pattern-matches on
%{assigns: assigns} so the same host-owned policy works for both transports.
For the LiveView surface it receives the socket-shaped value passed into
Threadline.OperatorSurface.Auth.on_mount/4; when export routes fall back to
it, they call it with a synthetic %{assigns: conn.assigns} mirror. The
callback should return:
:okortrue- Allowed.{:ok, scope}- Allowed. Thescopeis host-owned and opaque. Threadline carries it into investigation queries where implemented today, but it does not define a roles DSL, page-level authorization model, or universal scope narrowing contract.- any other value - Denied.
Telemetry event [:threadline, :operator_surface, :authorize] is emitted with the outcome (:granted, :denied, or :error).
live_session and on_mount protect the LiveView pages only. They do not
secure the sibling HTTP export controller routes. Export denials stay
HTTP-native through Threadline.OperatorSurface.ExportAuthPlug: denial or
error halts with plain-text 403, not a LiveView redirect.
:actor_fn
The :actor_fn acts just like the native Threadline.Plug configuration, determining the identity performing actions in the operator surface.
Available Screens (v1.17)
The surface provides three must-have workflows out of the box. Together they answer the vast majority of investigation questions on click 1.
Incident Drill-down (/audit/transactions/:id)
Answers: "What exactly changed in this transaction, and why?"
Shows all mutations that occurred within a single database transaction, visualizing what was added, removed, or changed. This uses Threadline.incident_bundle/2 under the hood.
Actor Window (/audit/actors/:kind/:id)
Answers: "What did this user/system do recently?" A time-windowed view of all transactions initiated by a specific actor identity. From here, you can deep-link into specific Incident Drill-down screens.
Row History / As-of Sub-view (/audit/rows/:table/:pk)
Answers: "When did this specific record change, and what did it look like at 2:00 PM yesterday?" Reachable directly from drill-down rows, this screen shows the full mutation lifecycle of a single record and reconstructs its exact state as-of any point in time.
First verification steps
After mounting /audit, verify the boundary before you treat the surface as
ready:
- Visit
/auditas an allowed admin and confirm the timeline loads. - Hit an export URL without the required host auth and confirm you get
403rather than a redirect loop. - Run
mix threadline.health.coverageand compare it with/audit/coverage. - Run
mix threadline.policy.showand compare it with/audit/policy/redaction.
Mounted workflow parity
| Mounted workflow | Operator question | Fallback transport | Guarantee level |
|------|-------|----------------|
| /audit/transactions/:id | What changed in this one transaction? | mix threadline.incident <transaction_id> | Direct parity |
| /audit/actors/:kind/:id | What did this actor drive recently? | Threadline.actor_history/2 or Threadline.timeline_page/2 | API parity |
| /audit/rows/:table/:pk | How did this row change over time? | Threadline.history/3 and Threadline.as_of/4 | API parity |
| export actions from /audit | Can I download the same filtered audit data? | mix threadline.export --dry-run --table posts or a file export run | CLI parity |
| /audit/coverage | Which tables are covered right now? | mix threadline.health.coverage | Direct parity |
| /audit/policy/redaction | Does deployed redaction match config? | mix threadline.policy.show | Direct parity |
mix threadline.incident Companion Task
For operators who rely on SSH or CLI access (and for projects not using Phoenix), Threadline provides parity via a Mix task.
You can query the exact same incident data natively in the terminal without mounting the LiveView surface:
mix threadline.incident <transaction_id>
Coverage dashboard
The operator surface ships a polled coverage dashboard at /audit/coverage that wraps Threadline.Health.trigger_coverage/1. Every LV in the surface also renders a small "uncovered count" pill in its header so operators notice drift from any screen.
Reading the dashboard
The dashboard renders three buckets:
- covered — tables that have a Threadline trigger installed.
- uncovered — tables that DO NOT have a trigger and are NOT marked expected.
- expected — tables intentionally not audited (e.g.
schema_migrations). TheSOURCEcolumn shows whether the entry comes from the hardcoded baseline or from your:expected_uncovered_tablesconfig.
Polling
The dashboard polls every 30 seconds by default. Override globally:
config :threadline, :coverage_poll_ms, 30_000Floor is 5_000 ms — below this the two pg_* queries become a noisy neighbor on busy schemas.
Multi-schema adopters
Pass ?schema=NAME to view a non-public schema:
/audit/coverage?schema=tenant_42The schema is validated at the LV edge (regex + pg_namespace lookup); invalid input renders a Schema 'X' not found. error.
The surface header always queries the "public" schema — multi-schema is opt-in on the dashboard only.
Marking expected-uncovered tables
Adopters typically have bookkeeping tables that are not application data (Oban, application metrics, vendor add-ons). Declare them so the dashboard shows them as expected rather than uncovered:
config :threadline, :health,
expected_uncovered_tables: ["oban_jobs", "oban_peers", "oban_producers"],
audit_anyway: []Validate at boot in your application.ex:
Threadline.Health.Policy.validate!(Application.get_env(:threadline, :health, []))The :audit_anyway key removes a baseline entry. Use rarely — it overrides the safe default. Example:
config :threadline, :health,
audit_anyway: ["schema_migrations"] # very unusual — opts in to auditing migrationsMix-task parity
Capture-only adopters who do not mount the surface get the same data via:
mix threadline.health.coverage
mix threadline.health.coverage --json
mix threadline.health.coverage --schema=NAMEThe Mix task is a viewer (always exits 0). The CI gate is the existing mix threadline.verify_coverage task, which now also accepts --schema=NAME.
Policy redaction drift
The operator surface also ships a read-only redaction drift viewer at /audit/policy/redaction. It reconciles your configured config :threadline, :trigger_capture policy against the deployed trigger SQL that PostgreSQL is actually running.
What it shows
The page groups tables into three operator-safe states:
- Drift detected — configured redaction does not match deployed trigger SQL. Rerun
mix threadline.gen.triggersand apply the migration. - Could not introspect — Threadline could not safely parse the deployed trigger SQL. Treat this as unresolved drift; rerun
mix threadline.gen.triggersand do not assume capture is aligned. - Config matches deployed — configured redaction matches deployed trigger redaction.
Tables are shown alphabetically within each section. Expanding a row shows the exact configured and deployed exclude, mask, and mask placeholder facts for that table.
No sample values
This surface never renders captured sample values. It only shows column names and placeholder metadata, so operators can confirm policy shape without exposing redacted payloads in the UI.
Mix-task parity
Capture-only adopters can inspect the same facts without Phoenix:
mix threadline.policy.show
mix threadline.policy.show --jsonDefault output prints one summary line, one aligned TABLE / STATUS / CONFIG / DEPLOYED / HINT table, then extra detail blocks only for Drift detected and Could not introspect. --json exposes the same top-level states as stable machine values:
drift_detectedcould_not_introspectconfig_matches_deployed
Telemetry
[:threadline, :health, :checked] fires on every successful poll with measurements %{covered, uncovered, expected_uncovered}. The expected_uncovered measurement is additive (Phase 66) — old subscribers reading only covered/uncovered keep working unchanged.
[:threadline, :health, :checked, :error] fires on poll failure with metadata %{error: message}; alert on this for sustained drift.