Some checks failed
		
		
	
	Build Test Deploy / authority-container (push) Has been cancelled
				
			Build Test Deploy / docs (push) Has been cancelled
				
			Build Test Deploy / deploy (push) Has been cancelled
				
			Build Test Deploy / build-test (push) Has been cancelled
				
			Docs CI / lint-and-preview (push) Has been cancelled
				
			
		
			
				
	
	
		
			82 lines
		
	
	
		
			5.2 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
			
		
		
	
	
			82 lines
		
	
	
		
			5.2 KiB
		
	
	
	
		
			Markdown
		
	
	
	
	
	
# Authority Monitoring & Alerting Playbook
 | 
						||
 | 
						||
## Telemetry Sources
 | 
						||
- **Traces:** Activity source `StellaOps.Authority` emits spans for every token flow (`authority.token.validate_*`, `authority.token.handle_*`, `authority.token.validate_access`). Key tags include `authority.endpoint`, `authority.grant_type`, `authority.username`, `authority.client_id`, and `authority.identity_provider`.
 | 
						||
- **Metrics:** OpenTelemetry instrumentation (`AddAspNetCoreInstrumentation`, `AddHttpClientInstrumentation`, custom meter `StellaOps.Authority`) exports:
 | 
						||
  - `http.server.request.duration` histogram (`http_route`, `http_status_code`, `authority.endpoint` tag via `aspnetcore` enrichment).
 | 
						||
  - `process.runtime.gc.*`, `process.runtime.dotnet.*` (from `AddRuntimeInstrumentation`).
 | 
						||
- **Logs:** Serilog writes structured events to stdout. Notable templates:
 | 
						||
  - `"Password grant verification failed ..."` and `"Plugin {PluginName} denied access ... due to lockout"` (lockout spike detector).
 | 
						||
  - `"Granting StellaOps bypass for remote {RemoteIp}"` (bypass usage).
 | 
						||
  - `"Rate limit exceeded for path {Path} from {RemoteIp}"` (limiter alerts).
 | 
						||
 | 
						||
## Prometheus Metrics to Collect
 | 
						||
| Metric | Query | Purpose |
 | 
						||
| --- | --- | --- |
 | 
						||
| `token_requests_total` | `sum by (grant_type, status) (rate(http_server_duration_seconds_count{service_name="stellaops-authority", http_route="/token"}[5m]))` | Token issuance volume per grant type (`grant_type` comes via `authority.grant_type` span attribute → Exemplars in Grafana). |
 | 
						||
| `token_failure_ratio` | `sum(rate(http_server_duration_seconds_count{service_name="stellaops-authority", http_route="/token", http_status_code=~"4..|5.."}[5m])) / sum(rate(http_server_duration_seconds_count{service_name="stellaops-authority", http_route="/token"}[5m]))` | Alert when > 5 % for 10 min. |
 | 
						||
| `authorize_rate_limit_hits` | `sum(rate(aspnetcore_rate_limiting_rejections_total{service_name="stellaops-authority", limiter="authority-token"}[5m]))` | Detect rate limiting saturations (requires OTEL ASP.NET rate limiter exporter). |
 | 
						||
| `lockout_events` | `sum by (plugin) (rate(log_messages_total{app="stellaops-authority", level="Warning", message_template="Plugin {PluginName} denied access for {Username} due to lockout (retry after {RetryAfter})."}[5m]))` | Derived from Loki/Promtail log counter. |
 | 
						||
| `bypass_usage_total` | `sum(rate(log_messages_total{app="stellaops-authority", level="Information", message_template="Granting StellaOps bypass for remote {RemoteIp}; required scopes {RequiredScopes}."}[5m]))` | Track trusted bypass invocations. |
 | 
						||
 | 
						||
> **Exporter note:** Enable `aspnetcore` meters (`dotnet-counters` name `Microsoft.AspNetCore.Hosting`), or configure the OpenTelemetry Collector `metrics` pipeline with `metric_statements` to remap histogram counts into the shown series.
 | 
						||
 | 
						||
## Alert Rules
 | 
						||
1. **Token Failure Surge**
 | 
						||
   - _Expression_: `token_failure_ratio > 0.05`
 | 
						||
   - _For_: `10m`
 | 
						||
   - _Labels_: `severity="critical"`
 | 
						||
   - _Annotations_: Include `topk(5, sum by (authority_identity_provider) (increase(authority_token_rejections_total[10m])))` as diagnostic hint (requires span → metric transformation).
 | 
						||
2. **Lockout Spike**
 | 
						||
   - _Expression_: `sum(rate(log_messages_total{message_template="Plugin {PluginName} denied access for {Username} due to lockout (retry after {RetryAfter})."}[15m])) > 10`
 | 
						||
   - _For_: `15m`
 | 
						||
   - Investigate credential stuffing; consider temporarily tightening `RateLimiting.Token`.
 | 
						||
3. **Bypass Threshold**
 | 
						||
   - _Expression_: `sum(rate(log_messages_total{message_template="Granting StellaOps bypass for remote {RemoteIp}; required scopes {RequiredScopes}."}[5m])) > 1`
 | 
						||
   - _For_: `5m`
 | 
						||
   - Alert severity `warning` — verify the calling host list.
 | 
						||
4. **Rate Limiter Saturation**
 | 
						||
   - _Expression_: `sum(rate(aspnetcore_rate_limiting_rejections_total{service_name="stellaops-authority"}[5m])) > 0`
 | 
						||
   - Escalate if sustained for 5 min; confirm trusted clients aren’t misconfigured.
 | 
						||
 | 
						||
## Grafana Dashboard
 | 
						||
- Import `docs/ops/authority-grafana-dashboard.json` to provision baseline panels:
 | 
						||
  - **Token Success vs Failure** – stacked rate visualization split by grant type.
 | 
						||
  - **Rate Limiter Hits** – bar chart showing `authority-token` and `authority-authorize`.
 | 
						||
  - **Bypass & Lockout Events** – dual-stat panel using Loki-derived counters.
 | 
						||
  - **Trace Explorer Link** – panel links to `StellaOps.Authority` span search pre-filtered by `authority.grant_type`.
 | 
						||
 | 
						||
## Collector Configuration Snippets
 | 
						||
```yaml
 | 
						||
receivers:
 | 
						||
  otlp:
 | 
						||
    protocols:
 | 
						||
      http:
 | 
						||
exporters:
 | 
						||
  prometheus:
 | 
						||
    endpoint: "0.0.0.0:9464"
 | 
						||
processors:
 | 
						||
  batch:
 | 
						||
  attributes/token_grant:
 | 
						||
    actions:
 | 
						||
      - key: grant_type
 | 
						||
        action: upsert
 | 
						||
        from_attribute: authority.grant_type
 | 
						||
service:
 | 
						||
  pipelines:
 | 
						||
    metrics:
 | 
						||
      receivers: [otlp]
 | 
						||
      processors: [attributes/token_grant, batch]
 | 
						||
      exporters: [prometheus]
 | 
						||
    logs:
 | 
						||
      receivers: [otlp]
 | 
						||
      processors: [batch]
 | 
						||
      exporters: [loki]
 | 
						||
```
 | 
						||
 | 
						||
## Operational Checklist
 | 
						||
- [ ] Confirm `STELLAOPS_AUTHORITY__OBSERVABILITY__EXPORTERS` enables OTLP in production builds.
 | 
						||
- [ ] Ensure Promtail captures container stdout with Serilog structured formatting.
 | 
						||
- [ ] Periodically validate alert noise by running load tests that trigger the rate limiter.
 | 
						||
- [ ] Include dashboard JSON in Offline Kit for air-gapped clusters; update version header when metrics change.
 |