Skip to content
GitLab
Menu
Projects
Groups
Snippets
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
Menu
Open sidebar
The Tor Project
Community
Hackweek
Commits
f14ec88d
Commit
f14ec88d
authored
Apr 06, 2021
by
Gaba
🦋
Browse files
Merge branch 'anticensorship' into 'main'
Anticensorship notes See merge request
!7
parents
dc989cfd
305361d3
Changes
1
Hide whitespace changes
Inline
Side-by-side
anti-censorship-alerting.md
0 → 100644
View file @
f14ec88d
# Tor Hackweek Project: Prometheus alerts for anti-censorship metrics
Summary: We have BridgeDB exporting prometheus metrics so far, and we
could implement this for Snowflake. It would be great if we could get
alerts when usage changes to notify us of possible censorship
events. Somewhat related, it would also be nice to get alerts when
default bridge usage drops off suddenly or directly connecting Tor
users from different regions.
Skills Needed: Maybe Go (for changes to snowflake), maybe Python for
other services, some sysadmin experience to figure out how to do the
alerts, metrics pipeline experience.
# Team
*
anarcat (utc-4)
*
cecylia (cohosh) (UTC -4)
*
tara(?) (UTC +1)
*
agix(?) (UTC +1)
# Main objectives
1.
Documentation!
- [documented what the prometheus2 server is doing](https://gitlab.torproject.org/tpo/tpa/team/-/wikis/howto/prometheus#monitored-services)
- document all of our anti-censorship alerts in one place
(where?): not completed?
2.
Expand our prometheus metrics for anti-censorship services
- [export existing snowflake metrics for prometheus](https://gitlab.torproject.org/tpo/anti-censorship/pluggable-transports/snowflake/-/merge_requests/32) -
in general see [those guidelines for adding metrics](https://gitlab.torproject.org/tpo/tpa/team/-/wikis/howto/prometheus#adding-metrics-for-users)
- add disk space/RAM/CPU monitoring for anti-censorship services:
some of those are already covered for by TPA, on TPA
machines. external services should be monitored explicitly:
install the [Prometheus node exporter](https://github.com/prometheus/node_exporter) ([Debian package](https://tracker.debian.org/pkg/prometheus-node-exporter))
and tell TPA which URL to scrape
- expand the metrics tor exports for Prometheus: not done?
3.
Play around with prometheus alert rules to recognize both outages
and trends
- tor exports prometheus data out of the metrics port now!
- we did some work on alerting
- we setup basic alerts on bridgestrap metrics to monitor bridges
4.
Figure out where to send all of our alerts
- emails are sent to [our existing anti-censorship alerts mailing list](https://lists.torproject.org/cgi-bin/mailman/listinfo/anti-censorship-alerts)
- Make sure we're also noticing logged errors for our services (we
currently only use those for debugging) - advice from anarcat:
log analysis is hard and annoying; instead, export error- or
warning-specific counters in metrics and do alerting on that,
you can dig in the logs to see the exact errors afterwards
Write
Preview
Supports
Markdown
0%
Try again
or
attach a new file
.
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment