Trust Center
Observability

Telemetry Posture

How operational visibility is approached in the Vorantiq operating environment. This page distinguishes what is wired and live, what is scaffolded and no-op safe, what is intentionally not enabled, and what is planned. No implied maturity beyond verified reality.

Pre-launch posture

Runtime telemetry primitives are shipped and no-op safe. No external observability vendor is wired into the production deployment today; the integration code is vendor-neutral and activates only when the deployment-time environment variables are set. Until that activation lands, errors are captured via structured logging and the per-request correlation id is the join key for support investigations.

Status legend

Complete

Wired and live in production runtime.

Scaffolded

Code is shipped and no-op safe. Not yet active against an external surface.

Not enabled

Code is shipped, but the deployment-time environment variable required to activate the capability is intentionally unset in production today.

Architected

Designed in a tracked B-document; implementation pending.

Planned

Acknowledged future work without a current implementation.

Blocked

Cannot advance until the active Production-Safety Stop is lifted.

Honest gaps

These are the deficits an enterprise SRE reviewer should expect to see closed before regulated-industry adoption. Each is sourced to docs/observability/README.md and reflected in /security gaps.

01

No live distributed-tracing backend. OpenTelemetry adapter is real and vendor-neutral; no exporter endpoint configured today.

02

No production telemetry vendor enabled. Honeycomb / Datadog / Tempo selection is design-track B.5.1.

03

No latency heatmaps or p50/p95/p99 dashboards. Depends on the live tracing backend.

04

No runtime topology maps. Depends on the live tracing backend.

05

No live SIEM integration. Audit-event SIEM forward is unscheduled.

06

Production metrics endpoint is not registered. Code is ready; exposure is design-track B.5.2.

07

Frontend Sentry SDK shipped but not active — DSN unset in production. Backend Sentry SDK not yet integrated.

08

PII scrubber for spans/logs is architected, not implemented.

09

Audit-events live-DB activation is blocked by the Production-Safety Stop.

Vendor-neutrality posture

The observability code never imports a vendor-specific exporter package. Activation is purely environment-driven via standard OTel variables (OTEL_ENABLED, OTEL_SERVICE_NAME, OTEL_EXPORTER_OTLP_ENDPOINT, OTEL_EXPORTER_OTLP_HEADERS). A customer-private deployment can route traces to its own collector without code change; the adapter cannot phone home to a vendor we did not document.

Privacy constraints

Correlation ids are not secrets, not PII, and safe to log. Structured-log call sites must not log secrets, OAuth tokens, password material, or full request bodies on sensitive surfaces; the PII scrubber is the second line of defense. Trace span attributes must not carry tenant-isolating PII; tenant ids are the resolution boundary. The canonical audit-events schema does not store unbounded free-text payloads — fields are typed to the action category.