Observability
The observability stack provides comprehensive visibility into platform operations through metrics collection, log aggregation, distributed tracing, and pre-built dashboards for proactive monitoring and rapid incident response.
Overview
The observability stack provides complete visibility into DALP platform operations. Metrics, logs, and traces from all components collect centrally for unified monitoring. Pre-built dashboards surface operational health while alerting rules detect anomalies before they impact users.
Enterprise platforms require comprehensive observability. Operators need visibility into system health, security teams need audit trails, and developers need debugging capabilities. The observability stack addresses all these requirements through a unified telemetry infrastructure.
Three pillars

Metrics
Time-series metrics capture quantitative measurements over time. Counters, gauges, and histograms represent request counts, resource utilization, and latency distributions.
| Metric category | Examples | Use case |
|---|---|---|
| Request metrics | Rate, latency, errors | Performance monitoring |
| Resource metrics | CPU, memory, connections | Capacity planning |
| Business metrics | Transactions, assets, users | Operational reporting |
| Chain metrics | Block lag, gas prices, confirmations | Blockchain health |
Logs
Structured logs capture discrete events with rich context. JSON formatting enables efficient parsing and querying. Correlation identifiers link related log entries across components.
Traces
Distributed traces follow operations across component boundaries. Spans capture timing and metadata for each step. Trace visualization reveals bottlenecks and failure points in complex operations.
Pre-built dashboards
| Dashboard | Audience | Key metrics |
|---|---|---|
| Operations overview | Platform operators | Request rates, error rates, latency |
| Transaction monitor | Operations team | Pending transactions, gas usage, confirmations |
| Compliance activity | Compliance officers | Verification volumes, approval rates |
| Security overview | Security team | Authentication events, access patterns |
| Infrastructure health | DevOps | Resource utilization, node health |

Alerting
Alert rules trigger notifications when metrics exceed thresholds or exhibit anomalous patterns.
| Alert category | Condition | Severity |
|---|---|---|
| Error rate spike | Error rate > 5% for 5 minutes | Critical |
| Latency degradation | P99 latency > 2x baseline | Warning |
| Resource exhaustion | Memory > 90% for 10 minutes | Warning |
| Chain connectivity | No blocks for 5 minutes | Critical |
| Transaction failure | Failure rate > 1% | Warning |
Alert routing delivers notifications through appropriate channels: PagerDuty for critical alerts, Slack for warnings, email for informational.
Application logging configuration
Application logging can be configured through the config.yml file.
| Setting | Environment variable | Default | Description |
|---|---|---|---|
app.logLevel | LOG_LEVEL or SETTLEMINT_LOG_LEVEL | info | Minimum log level: debug, info, warn, warning, error, fatal |
app.logOrpcRequests | LOG_ORPC_REQUESTS | false | Enable verbose ORPC request/response logging |
Note:
LOG_LEVELtakes precedence during auto-configuration. Invalid values are silently ignored and fall back to environment defaults (debug for development, info for production, warning for test).
ORPC request logging
When app.logOrpcRequests is enabled, the platform logs detailed information for each API request:
- Request ID and URL
- HTTP method and elapsed time
- Response status codes
- Procedure execution paths
This setting is disabled by default to keep logs clean in development and production. Enable it for debugging API issues:
# config.yml
app:
logOrpcRequests: trueOr via environment variable:
LOG_ORPC_REQUESTS=true
Audit logging
Compliance requires comprehensive audit trails. The observability stack captures:
- All authentication events with outcome and context
- Authorization decisions with resource and action
- Data access with query details and results
- Configuration changes with before/after state
- Administrative actions with operator identity
Audit logs retain according to regulatory requirements, typically seven years for financial services. Tamper-evident storage ensures log integrity.
Incident response
Observability tooling supports rapid incident response:
Correlation: Trace IDs link logs, metrics, and traces for affected operations.
Timeline reconstruction: Log search with time filters reveals event sequences.
Impact assessment: Metrics dashboards quantify affected users and operations.
Root cause analysis: Trace visualization identifies failing components.
Integration options
| Component | Cloud options | Self-hosted options |
|---|---|---|
| Metrics | Datadog, New Relic | Prometheus, VictoriaMetrics |
| Logs | Datadog, Splunk | Loki, Elasticsearch |
| Traces | Datadog, Jaeger Cloud | Jaeger, Tempo |
| Visualization | Datadog, New Relic | Grafana |
Helm charts include Grafana dashboard configurations for common self-hosted deployments.
See also
- Database for database monitoring
- Chain Gateway for network metrics
Overview
Architecture-level operational posture for the DALP platform covering observability infrastructure, database architecture, and failure mode analysis for enterprise deployments.
Database
PostgreSQL serves as the authoritative store for application data, providing ACID guarantees, mature replication capabilities, and enterprise-proven reliability for mission-critical digital asset operations.