[observability] Observability Coverage Report - 2026-05-16 #32499
Closed
Replies: 1 comment
-
|
This discussion has been marked as outdated by Daily Observability Report for AWF Firewall and MCP Gateway. A newer discussion is available at Discussion #32716. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Executive Summary
This report reviews 17 completed workflow runs from a repository-wide fetch of 30 recent runs covering the last 7 days. Three runs were still in progress and were excluded because their artifacts were not final. Within the analyzed sample, AWF firewall coverage was 93.8% (15/16 firewall-enabled runs with
access.log) and MCP telemetry coverage was 100.0% (15/15 MCP-enabled runs withgateway.jsonlorrpc-messages.jsonl). Combined expected-component coverage was 96.8%, and 16/17 analyzed runs had all expected observability artifacts present.The only critical gap was
Smoke CI§25943259958, a firewall-enabled cancelled run that producedaw_info.jsonbut nosandbox/firewall/logs/access.log, leaving no egress trace for debugging. No MCP-enabled run was missing telemetry. All sampled MCP coverage came from the canonical fallbackrpc-messages.jsonl; none of the analyzed runs emitted the preferredgateway.jsonlfile.Seven firewall-enabled runs had non-empty
access.logfiles but only allow-path traffic, so deny-path evidence was not exercised in that part of the sample. A separate cancelledDeployment Incident Monitorrun §25944972693 stopped before agent setup and only yielded workflow-level logs, so it was treated as N/A for firewall and MCP coverage rather than counted as a component failure.Key Alerts and Anomalies
🔴 Critical Issues:
Smoke CI§25943259958:aw_info.jsonmarks the run as firewall-enabled, butsandbox/firewall/logs/access.logis missing. This is a direct observability gap for network debugging.access.logfiles withblocked_requests = 0, which limits deny-path validation even though the files were present.rpc-messages.jsonl;gateway.jsonlwas absent across the analyzed sample, so preferred structured gateway telemetry was not exercised.Deployment Incident Monitor§25944972693 cancelled after 1s and exposed only workflow-level logs. It was excluded from firewall/MCP denominators rather than treated as a missing-log defect.Coverage Summary
access.log)gateway.jsonlorrpc-messages.jsonl)📋 Detailed Run Analysis
Firewall-Enabled Runs
Missing Firewall Logs (
access.log)MCP-Enabled Runs
rpc-messages.jsonlrpc-messages.jsonlrpc-messages.jsonlrpc-messages.jsonlrpc-messages.jsonlrpc-messages.jsonlrpc-messages.jsonlrpc-messages.jsonlrpc-messages.jsonlrpc-messages.jsonlrpc-messages.jsonlrpc-messages.jsonlrpc-messages.jsonlrpc-messages.jsonlrpc-messages.jsonlMissing MCP Telemetry (
gateway.jsonlandrpc-messages.jsonlboth absent)None in the analyzed sample.
🔍 Telemetry Quality Analysis
Firewall Log Quality
access.logentries analyzed: 2269.api.githubcopilot.com:443(161),api.anthropic.com:443(68), andgithub.com:443/api.openai.com:443(11 each). Blocked requests were summarized under(unknown)in the aggregated firewall report.Gateway Log Quality
rpc-messages.jsonlin 15/15 MCP-enabled runs;gateway.jsonlin 0/15.agenticworkflows,github,mcpscripts,safeoutputs.rpc-messages.jsonlfiles because request/response IDs were not pairable for duration calculation.Healthy Runs Summary
access.logafter firewall enablement.Recommended Actions
Smoke CI§25943259958 cancelled afteraw_info.jsoncreation but before firewall log export, and ensureaccess.logis persisted even on early cancellation paths.mcp-logs/gateway.jsonlalongsiderpc-messages.jsonl, or document fallback-only operation as intentional, so structured latency and status metrics are available without extra reconstruction.📊 Historical Trends
Historical trend data was not derived in this run. This report is a 7-day point-in-time sample built from a single repository-wide fetch, with breadth preserved by excluding 3 in-progress runs and limiting repeated workflows to at most 2 samples each.
References: §25943259958, §25944972693, §25942475951
Warning
Firewall blocked 2 domains
The following domains were blocked by the firewall during workflow execution:
api.github.comgithub.com💡 Tip:
api.github.comis blocked because GitHub API access uses the built-in GitHub tools by default. Instead of addingapi.github.comtonetwork.allowed, usetools.github.mode: gh-proxyfor direct pre-authenticated GitHub CLI access without requiring network access toapi.github.com:See GitHub Tools for more information on
gh-proxymode.To allow these domains, add them to the
network.allowedlist in your workflow frontmatter:See Network Configuration for more information.
Beta Was this translation helpful? Give feedback.
All reactions