Distributed Tracing for Gateway #494
Tharsanan1
started this conversation in
General
Replies: 1 comment
-
|
In docs/product, we should probably highlight Moesif OTel support as well for expansion opportunity. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Distributed Tracing for Gateway
Overview
This proposal outlines the distributed tracing strategy for our Gateway with external policy engine processor.
Problem Statement
We need visibility into:
Proposed Solution
Architecture
Why we export traces to the OpenTelemetry Collector instead of a specific or set of predefined otel backends(Jeager,Zipkin,Grapana Tempo)
What We'll Export
1. From Envoy Gateway
Root Span (per request):
gateway.requestSERVERgateway.tenant_id,gateway.api_key_idExternal Processor Call Span:
policy_engine.evaluateCLIENT2. From Policy Engine
Server Span (receiving ext_proc call):
policy_engine.processSERVERPer-Policy Child Spans (critical for multi-policy observability):
policy.evaluate.{policy_name}policy.evaluate.rate_limit,policy.evaluate.authenticationINTERNALpolicy.name: Policy identifierpolicy.type: Category (rate_limit, auth, validation, etc.)policy.result: "allow" | "deny" | "error"policy.execution_order: Sequence number (1, 2, 3...)policy.decision_reason: Why it passed/failedWhat We Can Observe
Performance Analysis
Policy Insights
Error Tracking
References
Beta Was this translation helpful? Give feedback.
All reactions