Some checks failed
Build Test Deploy / authority-container (push) Has been cancelled
Build Test Deploy / docs (push) Has been cancelled
Build Test Deploy / deploy (push) Has been cancelled
Build Test Deploy / build-test (push) Has been cancelled
Docs CI / lint-and-preview (push) Has been cancelled
82 lines
5.2 KiB
Markdown
82 lines
5.2 KiB
Markdown
# Authority Monitoring & Alerting Playbook
|
||
|
||
## Telemetry Sources
|
||
- **Traces:** Activity source `StellaOps.Authority` emits spans for every token flow (`authority.token.validate_*`, `authority.token.handle_*`, `authority.token.validate_access`). Key tags include `authority.endpoint`, `authority.grant_type`, `authority.username`, `authority.client_id`, and `authority.identity_provider`.
|
||
- **Metrics:** OpenTelemetry instrumentation (`AddAspNetCoreInstrumentation`, `AddHttpClientInstrumentation`, custom meter `StellaOps.Authority`) exports:
|
||
- `http.server.request.duration` histogram (`http_route`, `http_status_code`, `authority.endpoint` tag via `aspnetcore` enrichment).
|
||
- `process.runtime.gc.*`, `process.runtime.dotnet.*` (from `AddRuntimeInstrumentation`).
|
||
- **Logs:** Serilog writes structured events to stdout. Notable templates:
|
||
- `"Password grant verification failed ..."` and `"Plugin {PluginName} denied access ... due to lockout"` (lockout spike detector).
|
||
- `"Granting StellaOps bypass for remote {RemoteIp}"` (bypass usage).
|
||
- `"Rate limit exceeded for path {Path} from {RemoteIp}"` (limiter alerts).
|
||
|
||
## Prometheus Metrics to Collect
|
||
| Metric | Query | Purpose |
|
||
| --- | --- | --- |
|
||
| `token_requests_total` | `sum by (grant_type, status) (rate(http_server_duration_seconds_count{service_name="stellaops-authority", http_route="/token"}[5m]))` | Token issuance volume per grant type (`grant_type` comes via `authority.grant_type` span attribute → Exemplars in Grafana). |
|
||
| `token_failure_ratio` | `sum(rate(http_server_duration_seconds_count{service_name="stellaops-authority", http_route="/token", http_status_code=~"4..|5.."}[5m])) / sum(rate(http_server_duration_seconds_count{service_name="stellaops-authority", http_route="/token"}[5m]))` | Alert when > 5 % for 10 min. |
|
||
| `authorize_rate_limit_hits` | `sum(rate(aspnetcore_rate_limiting_rejections_total{service_name="stellaops-authority", limiter="authority-token"}[5m]))` | Detect rate limiting saturations (requires OTEL ASP.NET rate limiter exporter). |
|
||
| `lockout_events` | `sum by (plugin) (rate(log_messages_total{app="stellaops-authority", level="Warning", message_template="Plugin {PluginName} denied access for {Username} due to lockout (retry after {RetryAfter})."}[5m]))` | Derived from Loki/Promtail log counter. |
|
||
| `bypass_usage_total` | `sum(rate(log_messages_total{app="stellaops-authority", level="Information", message_template="Granting StellaOps bypass for remote {RemoteIp}; required scopes {RequiredScopes}."}[5m]))` | Track trusted bypass invocations. |
|
||
|
||
> **Exporter note:** Enable `aspnetcore` meters (`dotnet-counters` name `Microsoft.AspNetCore.Hosting`), or configure the OpenTelemetry Collector `metrics` pipeline with `metric_statements` to remap histogram counts into the shown series.
|
||
|
||
## Alert Rules
|
||
1. **Token Failure Surge**
|
||
- _Expression_: `token_failure_ratio > 0.05`
|
||
- _For_: `10m`
|
||
- _Labels_: `severity="critical"`
|
||
- _Annotations_: Include `topk(5, sum by (authority_identity_provider) (increase(authority_token_rejections_total[10m])))` as diagnostic hint (requires span → metric transformation).
|
||
2. **Lockout Spike**
|
||
- _Expression_: `sum(rate(log_messages_total{message_template="Plugin {PluginName} denied access for {Username} due to lockout (retry after {RetryAfter})."}[15m])) > 10`
|
||
- _For_: `15m`
|
||
- Investigate credential stuffing; consider temporarily tightening `RateLimiting.Token`.
|
||
3. **Bypass Threshold**
|
||
- _Expression_: `sum(rate(log_messages_total{message_template="Granting StellaOps bypass for remote {RemoteIp}; required scopes {RequiredScopes}."}[5m])) > 1`
|
||
- _For_: `5m`
|
||
- Alert severity `warning` — verify the calling host list.
|
||
4. **Rate Limiter Saturation**
|
||
- _Expression_: `sum(rate(aspnetcore_rate_limiting_rejections_total{service_name="stellaops-authority"}[5m])) > 0`
|
||
- Escalate if sustained for 5 min; confirm trusted clients aren’t misconfigured.
|
||
|
||
## Grafana Dashboard
|
||
- Import `docs/ops/authority-grafana-dashboard.json` to provision baseline panels:
|
||
- **Token Success vs Failure** – stacked rate visualization split by grant type.
|
||
- **Rate Limiter Hits** – bar chart showing `authority-token` and `authority-authorize`.
|
||
- **Bypass & Lockout Events** – dual-stat panel using Loki-derived counters.
|
||
- **Trace Explorer Link** – panel links to `StellaOps.Authority` span search pre-filtered by `authority.grant_type`.
|
||
|
||
## Collector Configuration Snippets
|
||
```yaml
|
||
receivers:
|
||
otlp:
|
||
protocols:
|
||
http:
|
||
exporters:
|
||
prometheus:
|
||
endpoint: "0.0.0.0:9464"
|
||
processors:
|
||
batch:
|
||
attributes/token_grant:
|
||
actions:
|
||
- key: grant_type
|
||
action: upsert
|
||
from_attribute: authority.grant_type
|
||
service:
|
||
pipelines:
|
||
metrics:
|
||
receivers: [otlp]
|
||
processors: [attributes/token_grant, batch]
|
||
exporters: [prometheus]
|
||
logs:
|
||
receivers: [otlp]
|
||
processors: [batch]
|
||
exporters: [loki]
|
||
```
|
||
|
||
## Operational Checklist
|
||
- [ ] Confirm `STELLAOPS_AUTHORITY__OBSERVABILITY__EXPORTERS` enables OTLP in production builds.
|
||
- [ ] Ensure Promtail captures container stdout with Serilog structured formatting.
|
||
- [ ] Periodically validate alert noise by running load tests that trigger the rate limiter.
|
||
- [ ] Include dashboard JSON in Offline Kit for air-gapped clusters; update version header when metrics change.
|