TAMPERTRAIL v1.0.0 · Self-Hosted

Where Logs Become Evidence.

You already log everything.
But can you prove none of it was touched?

Self-hosted audit logging with SHA-256 hash chaining — any modification or deletion of logs is instantly detectable.

Runs alongside your appNo SaaS lock-inData never leaves your servers
Designed for:🛡SOC 2HIPAA🇪🇺GDPR🔒ISO 27001🇮🇳DPDP Act— for teams who know compliance will follow.
TamperTrail audit log dashboard showing tamper-proof cryptographic log entries
How TamperTrail Solves This
The Problem With Standard Logs

Standard application logs are not evidence.

  • Your data leaves your servers — Cloud logging tools store your logs on their infrastructure. Sensitive data, patient records, payment info — all of it sits on a vendor you don't control.
  • No proof logs weren't touched — Any database with UPDATE access can be silently edited. No standard logger detects this. Auditors can't verify what they can't prove.
  • Anyone with DB access can delete records — Quietly. No trace. No alert. An insider covers their tracks and your audit trail shows nothing happened.
Teams discover this gap too late — when an auditor asks for tamper-proof evidence during SOC 2, or when investigating an insider breach.
Read the Security Architecture Brief

Fire-and-Forget (WAL)

POST /v1/log responds in <10ms. Crash-safe Write-Ahead Log ingestion that never blocks your main application transactions.

SHA-256 Hash Chaining

Each entry hashes the previous. Any deletion, insertion, or modification immediately breaks the chain — providing mathematical proof to your auditors.

Encrypted Metadata Vault

Sensitive payload is instantly encrypted (AES-128-CBC + HMAC) server-side. Never touches the database in plaintext. Hidden from the dashboard API.

Compare the Architecture

Why SaaS lock-ins and plain PostgreSQL tables are a liability for raw audit trails.

FeatureCloud SaaS (Datadog/Splunk)Basic PostgreSQLTamperTrail
Data Ownership & ComplianceTrusted 3rd PartySelf-HostedSelf-Hosted / VPC
Cryptographic Tamper EvidenceNo (Trust SaaS UI)Anyone can UPDATESHA-256 Hash Chain
Encrypted Metadata VaultIndexed & searchedPlaintextAES-128 + HMAC
Crash-safe SetupHandled by VendorBlocking INSERTs slow appBuilt-in WAL (<10ms req)
Write Latency & BlockingHigh Latency / Async DropTransaction BlockingNon-blocking WAL (<10ms)
Audit IndependenceTrust the SaaSTrust the DBAMathematical Proof
Deployment Speed~ Days to map security policies~ Weeks to build schemas1 Cmd (docker compose)

One Docker command. Your logs become evidence.

Start InstallationView Pricing