Use this file to discover all available pages before exploring further.
An audit platform is only as trustworthy as its own operational health. When FleetDM stops reporting, osquery results go silent, or a vulnerability scan skips its scheduled run, teams lose the continuous visibility that compliance workflows depend on. This page explains how to verify that every service in the NextAudit AI stack is running correctly, where logs are written, and how to observe ongoing vulnerability scan activity — so that gaps in coverage are caught before they become audit findings.
Every stateful service in the stack declares a Docker health check. Docker evaluates each check on a fixed interval and marks the container healthy, unhealthy, or starting. Services that depend on each other (for example, fleet depends on mysql and redis) will not start until their dependencies are healthy.
PostgreSQL uses a shorter interval (5 s) than the other services because Flowise blocks on the service_healthy condition — a faster check reduces startup latency for the AI layer.
Fleet writes two separate log streams to the filesystem. Both paths are configured via environment variables and written inside the logs volume, which is mounted at /logs in the Fleet container.
Environment variable
Purpose
FLEET_FILESYSTEM_STATUS_LOG_FILE
Path for osquery status logs (agent lifecycle events)
FLEET_FILESYSTEM_RESULT_LOG_FILE
Path for osquery result logs (query output from enrolled hosts)
FLEET_LOGGING_JSON
Set to true to emit structured JSON logs instead of plaintext
The FLEET_OSQUERY_STATUS_LOG_PLUGIN variable controls which log destination receives osquery status messages. When set to filesystem, logs flow to the path defined by FLEET_FILESYSTEM_STATUS_LOG_FILE.
Enable FLEET_LOGGING_JSON=true in any environment where logs are forwarded to an external aggregator (such as Loki, Elasticsearch, or CloudWatch Logs). Structured JSON makes field extraction reliable without custom parsing rules.
Fleet runs scheduled vulnerability scans against the enrolled host inventory. Two environment variables govern how often scans run and where the vulnerability database is stored.
Environment variable
Purpose
FLEET_VULNERABILITIES_PERIODICITY
How frequently Fleet checks for new vulnerabilities (e.g., 1h)
FLEET_VULNERABILITIES_DATABASES_PATH
Filesystem path where Fleet stores its vulnerability database
FLEET_VULNERABILITIES_CURRENT_INSTANCE_CHECKS
Enables vulnerability checks on the current Fleet instance
The vulnerability database is stored in the vulndb volume, which is mounted at $FLEET_VULNERABILITIES_DATABASES_PATH inside the Fleet container:
Monitor the vulndb volume size over time. Fleet downloads CVE data on each periodicity cycle; a stale or unexpectedly small database may indicate network connectivity issues preventing the download.