Observability
The system produces traces and metrics via Open Telemetry, and logs to stdout
via zerolog. There are minimal informational
logs, as well as per-request audit logs that are written to the process’s
stdout
.
Audit logs
Audit logs provide a level of non-repudiation for the system. These logs are written to the container’s stdout, and cannot be disabled.
Each authenticated endpoint (both /token
and /git-credentials
) will record
details about the request, the authorization process, and the GitHub token
created. If an error occurs, this is also written out.
At a technical level, logs are written to stdout using zerolog at the “audit” log level. Initial data is collected by request middleware and the partial entry is then accessible via the context. The context entry is further enriched with details by other components, including both the JWT middleware and the vendor. such that the log is fully completed by the end of the request.
Audit log fields
All audit logs are in single-line JSON format, using the level
of audit
.
- Identifying data
level
: this is alwaysaudit
message
: this is alwaysaudit_event
- Request data
method
: the request method. This will currently beGET
for all standard requests.path
: the requested path.status
is the HTTP response status of the requestsourceIP
is the client IP of the requestoruserAgent
is the user agent reported by the clienterror
is the error produced by the request. This may come from internal errors or panics, as well as the JWT validation and token creation components.
- Authorization data
authorized
is a boolean that istrue
when the request JWT is successfully authorized by the service.authSubject
is the contents of thesub
field from the JWTauthIssuer
is the JWTiss
fieldauthAudience
is the (possibly multiple) reportedaud
field values from the JWTauthExpiry
is the JWT expiry time represented as an RFC-3339 date time string.authExpiryRemaining
is the number of seconds that the JWT will be valid for at the time of logging.
- Token data
repositories
is the set of repositories that the token allows access topermissions
is the set of GitHub token permissions assigned to the tokenexpiry
is the GitHub token expiry time represented as an RFC-3339 date time stringexpiryRemaining
is the number of seconds that the created GitHub token will be valid for at the time of logging.
{ "level": "audit", "method": "POST", "path": "/git-credentials", "status": 200, "sourceIP": "1.2.3.4:34340", "userAgent": "curl/8.3.0", "requestedProfile": "", "authorized": true, "authSubject": "organization:example-org:pipeline:example-repo:ref:refs/heads/feature-branch:commit:40631gitcommithash8b3:step:step-name-from-pipeline", "authIssuer": "https://agent.buildkite.com", "error": "", "authExpiry": "2025-01-20T04:52:58Z", "authExpiryRemaining": 299372, "expiry": "2025-01-20T05:09:45Z", "expiryRemaining": 1306372, "authAudience": ["github-app-auth:example-org"], "repositories": ["https://github.com/example-org/example-repo.git"], "permissions": ["contents:read"], "type": "audit", "time": "2025-01-20T04:47:00Z", "message": "audit_event"}
Open Telemetry
This section is a stub. For now, refer to the
.envrc
file
for details of all Open Telemetry related configuration that’s currently
possible.