Once you have successfully started Ditto, proceed with setting it up for continuous operation.
This page shows the basics for operating Ditto.
Configuration
Ditto has many config parameters which can be set in the config files or via environment variables. This section will cover some of Ditto’s config parameters.
MongoDB configuration
If you choose not to use the MongoDB container and instead use a dedicated MongoDB you can use the following environment variables in order to configure the connection to the MongoDB.
MONGO_DB_URI
: Connection string to MongoDBMONGO_DB_SSL_ENABLED
: Enabled SSL connection to MongoDBMONGO_DB_CONNECTION_MIN_POOL_SIZE
: Configure MongoDB minimum connection pool sizeMONGO_DB_CONNECTION_POOL_SIZE
: Configure MongoDB connection pool sizeMONGO_DB_READ_PREFERENCE
: Configure MongoDB read preferenceMONGO_DB_WRITE_CONCERN
: Configure MongoDB write concernPEKKO_PERSISTENCE_MONGO_JOURNAL_WRITE_CONCERN
: Configure Pekko Persistence MongoDB journal write concernPEKKO_PERSISTENCE_MONGO_SNAPS_WRITE_CONCERN
: Configure Pekko Persistence MongoDB snapshot write concern
Passwordless authentication at MongoDB via AWS IAM
Starting with Ditto 3.6.0
, it is possible to set up authentication with AWS IAM.
To enable this:
- configure your Kubernetes serviceaccount with the role ARN via annotation
eks.amazonaws.com/role-arn
- configure Ditto’s services to assume that role during MongoDB authentication
- either via environment variables:
MONGO_DB_USE_AWS_IAM_ROLE
: boolean configuring whether to use AWS IAM roles for authentication with MongoDBMONGO_DB_AWS_REGION
: string specifying the AWS regionMONGO_DB_AWS_ROLE_ARN
: string specifying the ARN of the AWS IAM Role to be assumed for MongoDB authenticationMONGO_DB_AWS_SESSION_NAME
: string the AWS session name to be used when assuming the IAM role
- or - when using the Helm chart - via
values.yaml
- below
serviceAccount
key in order to annotate the k8s serviceaccount with the role ARN to assume - below
dbconfig
key for each individual Ditto service
- below
- either via environment variables:
MongoDB tuning
This section contains known aspects when/how to tune Ditto working with MongoDB.
Background aggregation queries
Ditto runs several “background” queries against MongoDB (e.g. in order to clean up data in the background,
depending on the current load to the DB) using aggregate
.
This mainly is done on the “snapshot” collections, e.g. things_snaps
, policies_snaps
, connections_snaps
.
MongoDB 5
In MongoDB 5, the default settings of Ditto work just fine - the MongoDB aggregate
queries run quick enough and do
not cause much disk read operations.
MongoDB 6
In MongoDB 6 however, the aggregate
queries Ditto does to the snapshot collections drastically slowed down with much
data in the snapshot stores.
If you encounter poor query performance and e.g. a lot of additional “disk read IOPS”, you are also affected by this
issue. In that case, there are options in Ditto to enable creation of additional indexes which speed up the aggregation
queries to a comparable level than with MongoDB 5.
The following environment variables can be enabled to create those indexes:
MONGODB_READ_JOURNAL_SHOULD_CREATE_ADDITIONAL_SNAPSHOT_AGGREGATION_INDEX_PID_ID
:true
MONGODB_READ_JOURNAL_SHOULD_CREATE_ADDITIONAL_SNAPSHOT_AGGREGATION_INDEX_PID_SN
:true
MONGODB_READ_JOURNAL_SHOULD_CREATE_ADDITIONAL_SNAPSHOT_AGGREGATION_INDEX_PID_SN_ID
:true
They are also configurable via Helm values, e.g. for the things
service:
things:
config:
# holds configuration regarding the MongoReadJournal and e.g. the aggregation queries which are performed in it
readJournal:
# indexes contains configuration about additional indexes to create
indexes:
# whether to create the "pid"+"_id" compound index on the snapshot collection
createSnapshotAggregationIndexPidId: true
# whether to create the "pid"+"sn" compound index on the snapshot collection
createSnapshotAggregationIndexPidSn: true
# whether to create the "pid"+"sn"+"_id" compound index on the snapshot collection
createSnapshotAggregationIndexPidSnId: true
Ditto configuration
Each of Ditto’s microservice has many options for configuration, e.g. timeouts, cache sizes, etc.
In order to have a look at all possible configuration options and what default values they have, here are the configuration files of Ditto’s microservices:
- Policies: policies.conf
- Things: things.conf
- Things-Search: things-search.conf
- Connectivity: connectivity.conf
- Gateway: gateway.conf
Whenever you find the syntax ${?UPPER_CASE_ENV_NAME}
in the configuration files, you may overwrite the default value
by specifying that environment variable when running the container.
When no environment variable is defined in the config, you may change the default value anyway by specifying a “System property” you pass to the Java process.
The following example configures the devops password of the gateway-service started via docker-compose. In order
to supply additional configuration one has to add the variable in the corresponding command
section of the
docker-compose.yml
file.
...
# Alternative approach for configuration of the service
environment:
- JAVA_TOOL_OPTIONS=-Dditto.gateway.authentication.devops.password=foobar
The executable for the microservice is called starter.jar
. The configuration variables have to be set before
the -jar
option.
Pre-authentication
HTTP API calls to Ditto may be authenticated with a reverse proxy (e.g. a nginx) which:
- authenticates a user/subject
- passes the authenticated username as HTTP header
- ensures that this HTTP header can never be written by the end-user
By default, pre-authentication
is disabled in the Ditto gateway services.
It can however be enabled by configuring the environment variable ENABLE_PRE_AUTHENTICATION
to the value true
.
When it is enabled, the reverse proxy has to set the HTTP header x-ditto-pre-authenticated
.
The format of the “pre-authenticated” string is: <issuer>:<subject>
. The issuer defines which system authenticated
the user and the subject contains e.g. the user-id or -name.
This string must then be used in policies as “Subject ID”.
Example for a nginx “proxy” configuration:
auth_basic "Authentication required";
auth_basic_user_file nginx.htpasswd;
...
proxy_set_header x-ditto-pre-authenticated "nginx:${remote_user}";
OpenID Connect
The authentication provider must be added to the ditto-gateway configuration with unique configuration key
(e.g. myprovier
in the example below).
Either issuer
as single supported JWT "iss"
claim or issuers
(as a list of supported JWT "iss"
claims) has to be
configured. If issuers
is configured, this list has priority and the value configured in issuer
will be ignored.
The configured auth-subjects
, an optional field, takes a list of placeholders that will be
evaluated against incoming JWTs.
For each entry in auth-subjects
an authorization subject will be generated.
If the entry contains unresolvable placeholders, it will be ignored in full.
When auth-subjects
is not provided, the "sub"
claim ({{ jwt:sub }}
) is used by default.
Please read more details on the OpenId Connect configuration placeholder
to find out what is possible when defining the auth-subjects
.
ditto.gateway.authentication {
oauth {
openid-connect-issuers = {
myprovider = {
issuer = "localhost:9000"
#issuers = [
# "localhost:9000/one"
# "localhost:9000/two"
#]
auth-subjects = [
"{{ jwt:sub }}",
"{{ jwt:sub }}/{{ jwt:scp }}",
"{{ jwt:sub }}/{{ jwt:scp }}@{{ jwt:client_id }}",
"{{ jwt:sub }}/{{ jwt:scp }}@{{ jwt:non_existing }}",
"{{ jwt:roles/support }}"
]
}
}
}
}
http://
or https://
prefix as this is added
based on the configuration value of ditto.gateway.authentication.oauth.protocol
.In order to do this by specifying a Java system property, use the following:
-Dditto.gateway.authentication.oauth.openid-connect-issuers.myprovider.issuer=localhost:9000
-Dditto.gateway.authentication.oauth.openid-connect-issuers.myprovider.auth-subjects.0='{{ jwt:sub }}/{{ jwt:scp }}'
The configured subject-issuer will be used to prefix the value of each individual auth-subject
.
{
"subjects": {
"<provider>:<auth-subject-0>": {
"type": "generated"
},
...
"<provider>:<auth-subject-n>": {
"type": "generated"
}
}
}
As of the OAuth2.0 and OpenID Connect standards Ditto expects the headers Authorization: Bearer <JWT>
and
Content-Type: application/json
, containing the issued token of the provider.
The token has to be issued beforehand. The required logic is not provided by Ditto.
This can e.g. be done by an OIDC provider like Keycloak.
A project like oauth2-proxy
may be put in front of Ditto to handle the token-logic like e.g. loading/saving the token from/to a Cookie and passing
it to Ditto as Authorization
header.
If the chosen OIDC provider uses a self-signed certificate, the certificate has to be retrieved and configured for the pekko-http ssl configuration.
ssl-config {
trustManager = {
stores = [
{ type = "PEM", path = "/path/to/cert/globalsign.crt" }
]
}
}
Encrypt sensitive data in Connections
Since Ditto 3.1.0 there is the option to enable encryption on some connection fields before they are written to the database. This mechanism is transparent for the user and when data is retrieved by the standard connectivity managing endpoints no encryption will be visible. It is applied on the db layer before data is written to the database. Since ditto is using the event sourcing mechanism, if encryption is enabled on a system that have existing connections, encryption will only be applied on events written to the database after it was enabled. So for some time there will be events in the database that have the plain data until the background cleaner deletes the old events that are no longer needed for the event sourcing.
Encryption is done using a 256-bit AES symmetrical key and the AES/GCM/NoPadding transformation.
Symmetric key
To generate it you can use a convenience method already available at EncryptorAesGcm.generateAESKeyAsString()
or you can use the java standard library
javax.crypto.KeyGenerator keyGen=KeyGenerator.getInstance("AES");
keyGen.init(256);
javax.crypto.SecretKey aes256SymetricKey = keyGen.generateKey();
or with a terminal command.
$ openssl rand 32 | basenc --base64url
The key must be 256-bit Base64-encoded with url-safe alphabet using the UTF-8 charset. This is done already by the convenience method mentioned above (EncryptorAesGcm.generateAESKeyAsString()
Fields config
The fields to be encrypted are configurable as json pointers and the default ones are:
/uri
/credentials/key
/sshTunnel/credentials/password
/sshTunnel/credentials/privateKey
/credentials/parameters/accessKey
/credentials/parameters/secretKey
/credentials/parameters/sharedKey
/credentials/clientSecret
Only string values are supported. If a configured pointer is pointing at an object it will be ignored. Values that are valid URIs are treated specially and only the password of the user info part of that URI will be encrypted.
Configuration can be seen at Ditto service configuration files in the connectivity.conf at “ditto.connectivity.connection.encryption” section of the config.
If at some point encryption is decided to be disabled the symmetric key is important to be kept in the configuration otherwise the encrypted values will not be decrypted and the only way to fix the connections will be to edit the encrypted parts and save them.
Rate limiting
Since Ditto 2.4.0 , by default connections and websockets
are no longer artificially throttled / rate limited when consuming messages.
There are however configuration options in place in order to enable throttling on a “per-connection” / “per-websocket”
basis.
Please consult the available throttling
configuration sections in the
Ditto service configuration files.
Restricting entity creation
By default, Ditto allows anyone to create a new entity (policy or thing) in any namespace. However, this behavior can be customized, and the ability to create new entities can be restricted.
In the ditto-entity-creation.conf
, you can re-configure the entity-creation
section to suit your needs.
The basic schema is:
# restrict entity creation
ditto.entity-creation {
# this default entry allows every authenticated "auth-subject" to create any "resource-type" in any "namespace":
grant = [
{
resource-types = [
// "policy"
// "thing"
]
namespaces = [
// "org.eclipse.ditto*"
]
auth-subjects = [
// "pre:ditto-*"
]
}
]
revoke = [
# same as "grant", but rejecting requests which already passed "grant"
]
}
When enforcing, the logic is:
- Find a matching entry in the
grant
list - If one was found, ensure there is no matching entry in the
revoke
list - If that is the case, accept the request, otherwise deny it
An entry matches, when all the following conditions are met:
- The resource types list is empty, or contains the requested resource type
- The namespace wildcard list is empty, or contains a wildcard that matches the requested namespace
- The auth subject wildcard list is empty, or contains at least one matching wildcard of the authorized subjects for the request
This means, an existing entry, with all empty lists, will match. So the default configuration, allowing all access, can be as simple as:
ditto.entity-creation {
grant = [{}]
}
The resource types can be any of:
policy
thing
The namespace wildcard list, is a list of wildcard patters, which must match the namespace. *
will match any number
of characters, and ?
will match exactly one character.
The auth subject wildcard list requires only a single entry of the requests auth subjects to match, like oauth:user-id
or pre-authenticated:service
. *
will match any number of characters, and ?
will match exactly one character.
Example for configuring it via system properties.
This would only allow the subjects authenticated as either "pre:admin"
or "integration:some-connection"
to create
entities (things/policies) and no-one other:
-Dditto.entity-creation.grant.0.auth-subjects.0=pre:admin
-Dditto.entity-creation.grant.0.auth-subjects.1=integration:some-connection
These system properties would have to be configured for the “things” and “policies” services.
Limiting Indexed Fields
The default behavior of Ditto is to index the complete JSON of a thing, which includes all its attributes and features. This may not be desired behavior for certain use cases:
- Increased load on the search database, leading to performance degradation and increased database cost.
- Only a few fields are ever used for searching.
Since Ditto 3.5.0, there is a configuration to specify, by a namespace pattern, which fields will be included in the search database.
To enable this functionality, there are two new options in the thing-search.conf
configuration:
ditto {
//...
caching-signal-enrichment-facade-provider = org.eclipse.ditto.thingsearch.service.persistence.write.streaming.SearchIndexingSignalEnrichmentFacadeProvider
//...
search {
namespace-indexed-fields = [
{
namespace-pattern = "org.eclipse.test"
indexed-fields = [
"attributes",
"features/info/properties",
"features/info/other"
]
},
{
namespace-pattern = "org.eclipse*"
indexed-fields = [
"attributes",
"features/info"
]
}
]
}
There is a new implementation of the caching signal enrichment facade provider that must be configured to enable this functionality.
For each namespace pattern, only the selected fields are included in the search database. In the example above, for
things in the “org.eclipse.test” namespace, the fields indexed in the search database will
only be “attributes”, “features/info/properties”, and “features/info/other”.
Things matching the “org.eclipse*” namespace, only the “attributes” and “features/info” paths will be the only fields
indexed in the search database.
Important notes:
- Ditto will use the namespace of the thing and match the FIRST namespace-pattern it encounters. So make sure any configured namespace-patterns are unique enough to match.
- Ditto will automatically add the system-level fields it needs to operate, so no manual configuration of these is necessary.
Example for configuring the same configuration via system properties for the things-search
service:
-Dditto.search.namespace-indexed-fields.0.namespace-pattern=org.eclipse.test
-Dditto.search.namespace-indexed-fields.0.indexed-fields.0=attributes
-Dditto.search.namespace-indexed-fields.0.indexed-fields.1=features/info/properties
-Dditto.search.namespace-indexed-fields.0.indexed-fields.2=features/info/other
-Dditto.search.namespace-indexed-fields.1.namespace-pattern=org.eclipse*
-Dditto.search.namespace-indexed-fields.1.indexed-fields.0=attributes
-Dditto.search.namespace-indexed-fields.1.indexed-fields.1=features/info
Logging
Gathering logs for a running Ditto installation can be achieved by:
- sending logs to STDOUT/STDERR: this is the default
- can be disabled by setting the environment variable
DITTO_LOGGING_DISABLE_SYSOUT_LOG
totrue
- Benefits: simple, works with all Docker logging drivers (e.g. “awslogs”, “splunk”, etc.)
- can be disabled by setting the environment variable
- pushing logs into ELK stack: this can be done by setting the environment variable
DITTO_LOGGING_LOGSTASH_SERVER
- configure
DITTO_LOGGING_LOGSTASH_SERVER
to contain the endpoint of a logstash server
- configure
- writing logs to log files: this can be done by setting the environment variable
DITTO_LOGGING_FILE_APPENDER
totrue
- configure the amount of log files, and the total amount of space used for logs files via these environment
variables. It is also possible to clean up old log files and archives at start up.
In case
DITTO_LOGGING_TOTAL_LOG_FILE_SIZE
is used it is necessary to configure alsoDITTO_LOGGING_MAX_LOG_FILE_HISTORY
. The detailed meaning of these config values is described in the logback documentation.DITTO_LOGGING_FILE_APPENDER_THRESHOLD
(default:info
) - the thresholdlevel
to use for logging (only greater or equal levels will be logged)DITTO_LOGGING_FILE_NAME_PATTERN
(default:/var/log/ditto/<service-name>.log.%d{yyyy-MM-dd}.gz
) - the rollover period is inferred from the fileNamePatternDITTO_LOGGING_MAX_LOG_FILE_HISTORY
(default:10
)DITTO_LOGGING_TOTAL_LOG_FILE_SIZE
(default:1GB
)DITTO_LOGGING_CLEAN_HISTORY_ON_START
(default:false
)
- the format in which logging is done is “LogstashEncoder” format - that way the logfiles may easily be imported into an ELK stack
- when running Ditto in Kubernetes apply the
ditto-log-files.yaml
to your Kubernetes cluster in order to mount log files to the host system.
- configure the amount of log files, and the total amount of space used for logs files via these environment
variables. It is also possible to clean up old log files and archives at start up.
In case
Monitoring
In addition to logging, the Ditto images include monitoring features. Specific metrics are automatically gathered and published on an HTTP port. There it can be scraped by a Prometheus backend, from where the metrics can be accessed to display in dashboards (e.g. with Grafana).
Monitoring configuration
In the default configuration, each Ditto service opens a HTTP endpoint, where it provides the Prometheus metrics
on port 9095
. This can be changed via the environment variable PROMETHEUS_PORT
.
Ditto will automatically publish gathered metrics at the endpoint http://<container-host-or-ip>:9095/
.
Further, Prometheus can be configured to poll on all Ditto service endpoints in order to persist the historical metrics. Grafana can add a Prometheus server as its data source and can display the metrics based on the keys mentioned in section “Gathered metrics”.
Gathered metrics
In order to inspect which metrics are exported to Prometheus, just visit the Prometheus HTTP endpoint of a Ditto service:
http://<container-host-or-ip>:9095/
.
The following example shows an excerpt of metrics gathered for the gateway-service.
#Kamon Metrics
# TYPE jvm_threads gauge
jvm_threads{component="system-metrics",measure="total"} 72.0
# TYPE jvm_memory_buffer_pool_count gauge
jvm_memory_buffer_pool_count{component="system-metrics",pool="direct"} 14.0
# TYPE jvm_class_loading gauge
jvm_class_loading{component="system-metrics",mode="loaded"} 10491.0
# TYPE jvm_memory_buffer_pool_usage gauge
jvm_memory_buffer_pool_usage{component="system-metrics",pool="direct",measure="used"} 396336.0
# TYPE roundtrip_http_seconds histogram
roundtrip_http_seconds_bucket{le="0.05",ditto_request_path="/api/2/things/x",ditto_request_method="PUT",ditto_statusCode="201",segment="overall"} 1.0
roundtrip_http_seconds_sum{ditto_request_path="/api/2/things/x",ditto_statusCode="201",ditto_request_method="PUT",segment="overall"} 0.038273024
roundtrip_http_seconds_bucket{le="0.001",ditto_request_path="/api/2/things/x",ditto_request_method="PUT",ditto_statusCode="204",segment="overall"} 0.0
roundtrip_http_seconds_bucket{le="0.1",ditto_request_path="/api/2/things/x",ditto_request_method="PUT",ditto_statusCode="204",segment="overall"} 7.0
roundtrip_http_seconds_sum{ditto_request_path="/api/2/things/x",ditto_statusCode="204",ditto_request_method="PUT",segment="overall"} 0.828899328
# TYPE jvm_gc_promotion histogram
jvm_gc_promotion_sum{space="old"} 7315456.0
# TYPE jvm_gc_seconds histogram
jvm_gc_seconds_count{component="system-metrics",collector="scavenge"} 9.0
jvm_gc_seconds_sum{component="system-metrics",collector="scavenge"} 0.063
# TYPE jvm_memory_bytes histogram
jvm_memory_bytes_count{component="system-metrics",measure="used",segment="miscellaneous-non-heap-storage"} 54.0
jvm_memory_bytes_sum{component="system-metrics",measure="used",segment="miscellaneous-non-heap-storage"} 786350080.0
To put it in a nutshell, Ditto reports:
- JVM metrics for all services
- amount of garbage collections + GC times
- memory consumption (heap + non-heap)
- amount of threads + loaded classes
- HTTP metrics for gateway-service
- roundtrip times from request to response
- amount of HTTP calls
- status code of HTTP responses
- MongoDB metrics for things-service,
policies-service, things-search-service
- inserts, updates, reads per second
- roundtrip times
- connection metrics for connectivity-service
- processed messages
- mapping times
Have a look at the example Grafana dashboards and build and share new ones back to the Ditto community.
Operator defined custom metrics
Starting with Ditto 3.5.0, it is possible to configure “custom metrics” which are gathered by counting things matching
a defined namespace/filter combination.
This is configured via the search service configuration and builds on the
count things functionality.
The idea behind this is that you want to show some statistic (e.g. in Grafana) about the amount of “Things” managed in Ditto fulfilling a certain condition.
This would be an example search service configuration snippet for e.g. providing a metric named
all_produced_and_not_installed_devices
defining a query on existence of a production-date
and absence of
an installation-date
attribute:
ditto {
search {
operator-metrics {
enabled = true
scrape-interval = 15m
custom-metrics {
all_produced_and_not_installed_devices {
scrape-interval = 5m # overwrite scrape interval, run each 5 minutes
namespaces = [
"org.eclipse.ditto.smokedetectors"
"org.eclipse.ditto.cameras"
]
filter = "and(exists(attributes/production-date),not(exists(attributes/installation-date)))"
tags {
company = "acme-corp"
}
}
}
}
}
}
In order to add custom metrics via System properties, the following example shows how the above metric can be configured:
-Dditto.search.operator-metrics.custom-metrics.all_produced_and_not_installed_devices.enabled=true
-Dditto.search.operator-metrics.custom-metrics.all_produced_and_not_installed_devices.scrape-interval=5m
-Dditto.search.operator-metrics.custom-metrics.all_produced_and_not_installed_devices.namespaces.0=org.eclipse.ditto.smokedetectors
-Dditto.search.operator-metrics.custom-metrics.all_produced_and_not_installed_devices.namespaces.1=org.eclipse.ditto.cameras
-Dditto.search.operator-metrics.custom-metrics.all_produced_and_not_installed_devices.filter=and(exists(attributes/production-date),not(exists(attributes/installation-date)))
-Dditto.search.operator-metrics.custom-metrics.all_produced_and_not_installed_devices.tags.company=acme-corp
Ditto will perform a count things operation each 5m
(5 minutes), providing
a gauge named all_produced_and_not_installed_devices
with the count of the query, adding the tag company="acme-corp"
.
In Prometheus format, this would look like:
all_produced_and_not_installed_devices{company="acme-corp"} 42.0
Operator defined custom aggregation based metrics
Starting with Ditto 3.6.0, the “custom metrics” functionality is extended to support custom aggregation metrics.
This is configured via the search service configuration.
:warning: Abstain of defining grouping by fields that have a high cardinality, as this will lead to a high number of metrics and may overload the Prometheus server!
Now you can augment the statistic about “Things” managed in Ditto
fulfilling a certain condition with tags with either predefined values,
values retrieved from the things or values which are defined based on the matching filter.
This is fulfilled by using hardcoded values or placeholders in the tags configuration.
The supported placeholder types are inline
and group-by
placeholders.
Function expressions are also supported
to manipulate the values of the placeholders before they are used in the tags.
This would be an example search service configuration snippet for e.g. providing a metric named
online_devices
defining a query on the values of a ConnectionStatus
feature:
ditto {
search {
operator-metrics {
enabled = true
scrape-interval = 30m
custom-metrics {
...
}
custom-aggregation-metrics {
online_status {
enabled = true
scrape-interval = 20m # override scrape interval, run every 20 minutes
namespaces = [
"org.eclipse.ditto"
]
group-by {
"location" = "attributes/Info/location"
"isGateway" = "attributes/Info/gateway"
}
tags {
"online" = "{{ inline:online_placeholder }}"
"health" = "{{ inline:health }}"
"hardcoded-tag" = "hardcoded_value"
"location" = "{{ group-by:location | fn:default('missing location') }}"
"isGateway" = "{{ group-by:isGateway }}"
}
filters {
online_filter {
filter = "gt(features/ConnectionStatus/properties/status/readyUntil,time:now)"
inline-placeholder-values {
"online_placeholder" = true
"health" = "good"
}
}
offline_filter {
filter = "lt(features/ConnectionStatus/properties/status/readyUntil,time:now)"
inline-placeholder-values = {
"online_placeholder" = false
"health" = "bad"
}
}
}
}
}
}
}
}
To add custom metrics via System properties, the following example shows how the above metric can be configured:
-Dditto.search.operator-metrics.custom-aggregation-metrics.online_status.enabled=true
-Dditto.search.operator-metrics.custom-aggregation-metrics.online_status.scrape-interval=20m
-Dditto.search.operator-metrics.custom-aggregation-metrics.online_status.namespaces.0=org.eclipse.ditto
-Dditto.search.operator-metrics.custom-aggregation-metrics.online_status.tags.online="{{online_placeholder}}"
-Dditto.search.operator-metrics.custom-aggregation-metrics.online_status.tags.location="{{attributes/Info/location}}"
-Dditto.search.operator-metrics.custom-aggregation-metrics.online_status.filters.online-filter.filter=gt(features/ConnectionStatus/properties/status/readyUntil/,time:now)
-Dditto.search.operator-metrics.custom-aggregation-metrics.online_status.filters.online-filter.inline-placeholder-values.online_placeholder=true
-Dditto.search.operator-metrics.custom-aggregation-metrics.online_status.filters.online-filter.fields.0=attributes/Info/location
-Dditto.search.operator-metrics.custom-aggregation-metrics.online_status.filters.offline-filter.filter=lt(features/ConnectionStatus/properties/status/readyUntil/,time:now)
-Dditto.search.operator-metrics.custom-aggregation-metrics.online_status.filters.offline-filter.inline-placeholder-values.online_placeholder=false
-Dditto.search.operator-metrics.custom-aggregation-metrics.online_status.filters.offline-filter.fields.0=attributes/Info/location
Ditto will perform an aggregation operation over the search db collection every 20m
(20 minutes), providing
a gauge named online_devices
with the value of devices that match the filter.
The tags online
and location
will be added.
Their values will be resolved from the placeholders {{online_placeholder}}
and {{attributes/Info/location}}
respectively.
In Prometheus format, this would look like:
online_status{location="Berlin",online="false"} 6.0
online_status{location="Immenstaad",online="true"} 8.0
Tracing
Ditto supports reading and propagating W3C trace context headers at the
edges of the Ditto service (e.g. Gateway and Connectivity service). Several spans are generated when a request is
processed and the tracing data is exported in OpenTelemetry format using
kamon-opentelemetry library.
Adjust the following environment variables to configure the Ditto services to produce traces:
DITTO_TRACING_ENABLED
: determines whether tracing is enabled (default:false
)DITTO_TRACING_SAMPLER
: defines the used sampleralways
: report all tracesnever
: don’t report any trace (default)random
: randomly decide using the probability defined in theDITTO_TRACING_RANDOM_SAMPLER_PROBABILITY
environment variableadaptive
: keeps dynamic samplers for each operation while trying to achieve a set throughput goal (DITTO_TRACING_ADAPTIVE_SAMPLER_THROUGHPUT
)
DITTO_TRACING_OTEL_TRACE_REPORTER_ENABLED
: whether reporting traces via the OLTP endpoint should be activated (default:false
)OTEL_EXPORTER_OTLP_ENDPOINT
: the OTLP endpoint where to report the gathered traces (default:http://localhost:4317
)
DevOps commands
The “DevOps commands” API allows Ditto operators to make changes to a running installation without restarts.
The following DevOps commands are supported:
- Dynamically retrieve and change log levels
- Dynamically retrieve service configuration
- Piggyback commands
DevOps user
Used for authenticating the following endpoints:
/devops
/api/2/connections
devops
, password: foobar
. The password can be changed by setting the environment variable DEVOPS_PASSWORD
in the gateway service.Dynamically adjust log levels
Changing the log levels dynamically is very useful when debugging an accidental problem, since the cause of the problem could be lost on service restart.
Retrieve all log levels
Example for retrieving all currently configured log levels:
GET /devops/logging
Response:
{
"gateway": {
"10.0.0.1": {
"type": "devops.responses:retrieveLoggerConfig",
"status": 200,
"serviceName": "gateway",
"instance": "10.0.0.1",
"loggerConfigs": [{
"level": "info",
"logger": "ROOT"
}, {
"level": "info",
"logger": "org.eclipse.ditto"
}, {
"level": "warn",
"logger": "org.mongodb.driver"
}]
}
},
"things-search": {
...
},
"policies": {
...
},
"things": {
...
},
"connectivity": {
...
}
}
Change a specific log level for all services
Example request payload to change the log level of logger org.eclipse.ditto
in all services to DEBUG
:
PUT /devops/logging
{
"logger": "org.eclipse.ditto",
"level": "debug"
}
Retrieve log levels of a service
Example response for retrieving all currently configured log levels of gateways services:
GET /devops/logging/gateway
Response:
{
"1": {
"type": "devops.responses:retrieveLoggerConfig",
"status": 200,
"serviceName": "gateway",
"instance": 1,
"loggerConfigs": [{
"level": "info",
"logger": "ROOT"
}, {
"level": "info",
"logger": "org.eclipse.ditto"
}, {
"level": "warn",
"logger": "org.mongodb.driver"
}]
}
}
Change a specific log level for one service
Example request payload to change the log level of logger org.eclipse.ditto
in all instances of gateway-service to
DEBUG
:
PUT /devops/logging/gateway
{
"logger": "org.eclipse.ditto",
"level": "debug"
}
Dynamically retrieve configurations
Runtime configurations of services are available for the Ditto operator at
/devops/config/
with optional restrictions by service name, instance ID and configuration path.
The entire runtime configuration of a service may be dozens of kilobytes big. If it exceeds the cluster message size
of 250 kB, then it can only be read piece by piece via the path
query parameter.
Retrieve all service configurations
Retrieve the configuration at the path ditto.info
thus:
GET /devops/config?path=ditto.info
It is recommended to not omit the query parameter path
. Otherwise, the full configurations of all services are
aggregated in the response, which can become megabytes big.
The path ditto.info
points to information on service name, service instance index, JVM arguments and environment
variables. Response example:
{
"gateway": {
"10.0.0.1": {
"type": "common.responses:retrieveConfig",
"status": 200,
"config": {
"env": {
"PATH": "/usr/games:/usr/local/games"
},
"service": {
"instance-id": "10.0.0.1",
"name": "gateway"
},
"vm-args": [
"-Dfile.encoding=UTF-8"
]
}
}
},
"connectivity": {
"10.0.0.1": {
"type": "common.responses:retrieveConfig",
"status": 200,
"config": {
"env": {
"CONNECTIVITY_FLUSH_PENDING_RESPONSES_TIMEOUT": "3d"
},
"service": {
"instance-id": "10.0.0.1",
"name": "connectivity"
},
"vm-args": [
"-Dditto.connectivity.connection.snapshot.threshold=2"
]
}
}
}
}
Retrieve the configuration of a service instance
Retrieving the configuration of a specific service instance is much faster
because the response is not aggregated from an unknown number of respondents
over the duration given in the query parameter timeout
.
To retrieve ditto
configuration from Gateway instance 1
:
GET /devops/config/gateway/1?path=ditto
Response example:
{
"type": "common.responses:retrieveConfig",
"status": 200,
"config": {
"cluster": {
"number-of-shards": 20
},
"gateway": {
"authentication": {
"devops": {
"password": "foobar",
"secured": false
}
}
}
}
}
Piggyback commands
You can use a DevOps command to send a command to another actor in the cluster.
Those special commands are called piggyback commands.
A piggyback command must conform to the following schema:
Piggyback commands can be sent to only one actor in the cluster or to a group of actors.
To have control over this there are two headers which can be used for piggyback commands:
-
"is-group-topic"
:true
false
- Default:false
-
"aggregate"
:true
false
- Default:true
The "is-group-topic"
header indicates if the piggyback command should be forwarded to only one actor or all actors of a group.
The "aggregate"
header indicates if the responses should be aggregated or not.
If false
the first response is sent back and all other responses are ignored (if is-group-topic
was false
).
Additionally, the "ditto-sudo"
header can be used in order to bypass any enforcement/authorization the service performs
when processing commands. By explicitly setting this header to true
, you bypass enforcement.
Example:
{
"targetActorSelection": "/system/sharding/connection",
"headers": {
"aggregate": false,
"is-group-topic": true,
"ditto-sudo": true
},
"piggybackCommand": {
"type": "connectivity.commands:createConnection",
...
}
}
Managing policies
Piggyback commands can be used for managing policies, e.g. in order to create, retrieve, modify, delete policies with “devops” (super) user.
All PolicyCommands may be sent via piggyback - however be aware that the internal JSON representation of the policy commands must be used and not the Ditto Protocol.
The internal JSON representation can be found in the code, e.g. defined in the static fromJson
methods of the commands.
Example piggyback for CreatePolicy:
{
"targetActorSelection": "/system/sharding/policy",
"headers": {
"aggregate": false,
"is-group-topic": true,
"ditto-sudo": true
},
"piggybackCommand": {
"type": "policies.commands:createPolicy",
"policy": {
"policyId": "<insert-the-policy-id-to-create-here>",
"entries": {
...
}
}
}
}
Example piggyback for RetrievePolicy:
{
"targetActorSelection": "/system/sharding/policy",
"headers": {
"aggregate": false,
"is-group-topic": true,
"ditto-sudo": true
},
"piggybackCommand": {
"type": "policies.commands:retrievePolicy",
"policyId": "<insert-the-policy-id-to-retrieve-here>"
}
}
Managing things
Piggyback commands can be used for managing things, e.g. in order to create, retrieve, modify, delete things with “devops” (super) user.
All ThingCommands may be sent via piggyback - however be aware that the internal JSON representation of the thing commands must be used and not the Ditto Protocol.
The internal JSON representation can be found in the code, e.g. defined in the static fromJson
methods of the commands.
Example piggyback for CreateThing:
{
"targetActorSelection": "/system/sharding/thing",
"headers": {
"aggregate": false,
"is-group-topic": true,
"ditto-sudo": true
},
"piggybackCommand": {
"type": "things.commands:createThing",
"thing": {
"thingId": "<insert-the-thing-id-to-create-here>",
"policyId": "<insert-the-policy-id-to-use-here>"
}
}
}
Example piggyback for RetrieveThing:
{
"targetActorSelection": "/system/sharding/thing",
"headers": {
"aggregate": false,
"is-group-topic": true,
"ditto-sudo": true
},
"piggybackCommand": {
"type": "things.commands:retrieveThing",
"thingId": "<insert-the-thing-id-to-retrieve-here>"
}
}
Managing connections
The recommended way to manage (CRUD) connections in Ditto is by using the Manage connections via HTTP API.
However, Manage connections via Piggyback commands is still available to do this.
Managing background cleanup
Ditto deletes unnecessary events and snapshots in the background according to database load.
Configuration of background cleanup
The background cleanup configuration is available for:
- Policies: policies.conf
- Things: things.conf
- Connectivity: connectivity.conf
And has the following config parameters:
cleanup {
# enabled configures whether background cleanup is enabled or not
# If enabled, stale "snapshot" and "journal" entries will be cleaned up from the MongoDB by a background process
enabled = true
enabled = ${?CLEANUP_ENABLED}
# history-retention-duration configures the duration of how long to "keep" events and snapshots before being
# allowed to remove them in scope of cleanup.
# If this e.g. is set to 30d - then effectively an event history of 30 days would be available via the read
# journal.
history-retention-duration = 3d
history-retention-duration = ${?CLEANUP_HISTORY_RETENTION_DURATION}
# quiet-period defines how long to stay in a state where the background cleanup is not yet started
# Applies after:
# - starting the service
# - each "completed" background cleanup run (all entities were cleaned up)
quiet-period = 5m
quiet-period = ${?CLEANUP_QUIET_PERIOD}
# interval configures how often a "credit decision" is made.
# The background cleanup works with a credit system and does only generate new "cleanup credits" if the MongoDB
# currently has capacity to do cleanups.
interval = 3s
interval = ${?CLEANUP_INTERVAL}
# timer-threshold configures the maximum database latency to give out credit for cleanup actions.
# If write operations to the MongoDB within the last `interval` had a `max` value greater to the configured
# threshold, no new cleanup credits will be issued for the next `interval`.
# Which throttles cleanup when MongoDB is currently under heavy (write) load.
timer-threshold = 150ms
timer-threshold = ${?CLEANUP_TIMER_THRESHOLD}
# credits-per-batch configures how many "cleanup credits" should be generated per `interval` as long as the
# write operations to the MongoDB are less than the configured `timer-threshold`.
# Limits the rate of cleanup actions to this many per credit decision interval.
# One credit means that the "journal" and "snapshot" entries of one entity are cleaned up each `interval`.
credits-per-batch = 3
credits-per-batch = ${?CLEANUP_CREDITS_PER_BATCH}
# reads-per-query configures the number of snapshots to scan per MongoDB query.
# Configuring this to high values will reduce the need to query MongoDB too often - it should however be aligned
# with the amount of "cleanup credits" issued per `interval` - in order to avoid long running queries.
reads-per-query = 100
reads-per-query = ${?CLEANUP_READS_PER_QUERY}
# writes-per-credit configures the number of documents to delete for each credit.
# If for example one entity would have 1000 journal entries to cleanup, a `writes-per-credit` of 100 would lead
# to 10 delete operations performed against MongoDB.
writes-per-credit = 100
writes-per-credit = ${?CLEANUP_WRITES_PER_CREDIT}
# delete-final-deleted-snapshot configures whether for a deleted entity, the final snapshot (containing the
# "deleted" information) should be deleted or not.
# If the final snapshot is not deleted, re-creating the entity will cause that the recreated entity starts with
# a revision number 1 higher than the previously deleted entity. If the final snapshot is deleted as well,
# recreation of an entity with the same ID will lead to revisionNumber=1 after its recreation.
delete-final-deleted-snapshot = false
delete-final-deleted-snapshot = ${?CLEANUP_DELETE_FINAL_DELETED_SNAPSHOT}
}
By default, background cleanup is enabled for all entities and the retention duration is configured to 0d
(0 days),
meaning that no history will be kept for a longer time.
In order to use Ditto’s history capabilities, the configuration has to be adjusted accordingly.
Adjustment of background cleanup during runtime
Each Things, Policies and Connectivity instance has an actor coordinating a portion of the background cleanup process. The actor responds to piggyback-commands to query its state and configuration, modify its configuration, and restart the background cleanup process.
Each command is sent to the actor selection /user/<SERVICE_NAME>Root/persistenceCleanup
, where
SERVICE_NAME
is things
, policies
or connectivity
:
POST /devops/piggyback/<SERVICE_NAME>?timeout=10s
Query background cleanup coordinator state
POST /devops/piggyback/<SERVICE_NAME>?timeout=10s
{
"targetActorSelection": "/user/<SERVICE_NAME>Root/persistenceCleanup",
"headers": {},
"piggybackCommand": {
"type": "status.commands:retrieveHealth"
}
}
The response has the following details:
state
: The current state of the actor.pid
: The last persistence ID being cleaned up. It has the form<entity-type>:<entity-id>
.
{
"type": "status.responses:retrieveHealth",
"status": 200,
"statusInfo": {
"status": "UP",
"details": [
{
"INFO": {
"state": "RUNNING",
"pid": "thing:org.eclipse.ditto:fancy-thing_53"
}
}
]
}
}
Query background cleanup coordinator configuration
POST /devops/piggyback/<SERVICE_NAME>?timeout=10s
{
"targetActorSelection": "/user/<SERVICE_NAME>Root/persistenceCleanup",
"headers": {},
"piggybackCommand": {
"type": "common.commands:retrieveConfig"
}
}
Response example:
{
"type": "common.responses:retrieveConfig",
"status": 200,
"config": {
"enabled": true,
"interval": "3s",
"quiet-period": "5m",
"timer-threshold": "150ms",
"credits-per-batch": 3,
"reads-per-query": 100,
"writes-per-credit": 100,
"delete-final-deleted-snapshot": false
}
}
Modify background cleanup coordinator configuration
Send a piggyback command of type common.commands:modifyConfig
to change the configuration of the persistence cleanup
process. All subsequent cleanup processes will use the new configuration. The ongoing cleanup process is aborted.
Configurations absent in the payload of the piggyback command remain unchanged.
Set the special key last-pid
to set the lower bound of PIDs to clean up in the next run.
POST /devops/piggyback/<SERVICE_NAME>?timeout=10s
{
"targetActorSelection": "/user/<SERVICE_NAME>Root/persistenceCleanup",
"headers": {
"aggregate": false,
"is-group-topic": true
},
"piggybackCommand": {
"type": "common.commands:modifyConfig",
"config": {
"quiet-period": "240d",
"last-pid": "thing:namespace:PID-lower-bound"
}
}
}
The response contains the effective configuration of the background cleanup coordinator. If the configuration in the
piggyback command contains any error, then an error is logged and the actor’s configuration is unchanged.
The field last-pid
is not a part of the configuration.
{
"type": "common.responses:modifyConfig",
"status": 200,
"config": {
"enabled": true,
"interval": "3s",
"quiet-period": "240d",
"timer-threshold": "150ms",
"credits-per-batch": 3,
"reads-per-query": 100,
"writes-per-credit": 100,
"delete-final-deleted-snapshot": false
}
}
Cleanup events and snapshots of an entity
Send a cleanup command by piggyback to the entity’s service and shard region to trigger removal of stale events and
snapshots manually. Here is an example for things. Change the service name and shard region name accordingly for
policies and connections. Typically, in a docker based environment, use INSTANCE_INDEX=1
.
POST /devops/piggyback/things/<INSTANCE_INDEX>?timeout=10s
{
"targetActorSelection": "/system/sharding/thing",
"headers": {
"aggregate": false
},
"piggybackCommand": {
"type": "cleanup.sudo.commands:cleanupPersistence",
"entityId": "ditto:thing1"
}
}
Response example:
{
"type": "cleanup.sudo.responses:cleanupPersistence",
"status": 200,
"entityId": "thing:ditto:thing1"
}
Managing background synchronization
A background sync actor goes over thing snapshots and search index entries slowly to ensure eventual consistency of the search index. The actor operates in the same manner as the background cleanup coordinator and responds to the same commands.
POST /devops/piggyback/search/<INSTANCE_INDEX>?timeout=10s
{
"targetActorSelection": "/user/thingsWildcardSearchRoot/searchUpdaterRoot/backgroundSync/singleton",
"headers": {
"aggregate": false,
"is-group-topic": false
},
"piggybackCommand": {
"type": "<COMMAND-TYPE>"
}
}
COMMAND-TYPE
can be:
common.commands:shutdown
to shutdown or restart a background sync stream,common.commands:retrieveConfig
to retrieve the current configuration,common.commands:modifyConfig
to modify the current configuration, orstatus.commands:retrieveHealth
to query the current progress and event log.
For each command type, please refer to the corresponding segment of “Managing background cleanup” for the exact format.
common.commands:modifyConfig
command: enabled
, quiet-period
and keep.events
. Refer to Ditto configuration for instructions how to modify the other configuration settings.Force search index update of all things
You can trigger a search index update for all things by sending a command of type common.commands:shutdown
with the
force-update
header set to true
. The next background sync iteration (starting after the configured quiet period)
will trigger an update of the search index for all things. After the iteration of forced updates is complete
(or interrupted), the background sync will continue its normal operation.
POST /devops/piggyback/search?timeout=10s
{
"targetActorSelection": "/user/thingsWildcardSearchRoot/searchUpdaterRoot/backgroundSyncProxy",
"headers": {
"aggregate": false,
"is-group-topic": false,
"force-update": true
},
"piggybackCommand": {
"type": "common.commands:shutdown"
}
}
There is no response. You can check the logs of the search service to follow the sync progress.
Force search index update for all things of one or multiple namespaces
You can trigger a search index update for things of multiple namespaces by sending a common.commands:shutdown
command
with the force-update
header set to true
and the relevant namespaces specified in the namespaces
header. The next
background sync iteration (starting after the configured quiet period) will trigger an update of the search index for
the things in the specified namespaces. After the iteration of forced updates is complete (or interrupted),
the background sync will continue its normal operation.
POST /devops/piggyback/search?timeout=10s
{
"targetActorSelection": "/user/thingsWildcardSearchRoot/searchUpdaterRoot/backgroundSyncProxy",
"headers": {
"aggregate": false,
"is-group-topic": false,
"force-update": true,
"namespaces": ["namespace1", "namespace2"]
},
"piggybackCommand": {
"type": "common.commands:shutdown"
}
}
There is no response. You can check the logs of the search service to follow the sync progress.
Force search index update for one thing
The search index should rarely become out-of-sync for a long time, and it can repair itself of any inconsistencies detected at query time. Nevertheless, you can trigger search index update for a particular thing by a DevOps-command and bring the entry up-to-date immediately.
POST /devops/piggyback/search/<INSTANCE_INDEX>?timeout=0
{
"targetActorSelection": "/user/thingsWildcardSearchRoot/searchUpdaterRoot/thingsUpdater",
"headers": {
"aggregate": false,
"is-group-topic": true
},
"piggybackCommand": {
"type": "thing-search.sudo.commands:sudoUpdateThing",
"thingId": "<THING-ID>"
}
}
There is no response. Things-search service will log a warning upon receiving this message and continue to log warnings should the search index update fail on the persistence.
Erasing data within a namespace
Ditto supports erasure of all data within a namespace during live operations. To do so safely, perform the following steps in sequence.
- Block all messages to the namespace so that actors will not spawn in the namespace.
- Shutdown all actors in the namespace so that no actor will generate data in the namespace.
- Erase data from the persistence.
- Unblock messages to the namespace so that the old namespace could be reused at a later point in time.
Block all messages to a namespace
Send a piggyback command to Pekko’s pub-sub-mediator with type namespaces.commands:blockNamespace
to block all messages sent to actors belonging to a namespace.
PUT /devops/piggyback?timeout=10s
{
"targetActorSelection": "/system/distributedPubSubMediator",
"headers": {
"aggregate": false
},
"piggybackCommand": {
"type": "namespaces.commands:blockNamespace",
"namespace": "namespaceToBlock"
}
}
Once a namespace is blocked on all members of the Ditto cluster, you will get a response similar to the one below. The namespace will remain blocked for the lifetime of the Ditto cluster, or until you proceed with step 4, which unblocks it.
{
"type": "namespaces.responses:blockNamespace",
"status": 200,
"namespace": "namespaceToBlock",
"resourceType": "namespaces"
}
Shutdown all actors in a namespace
Send a piggyback command to Pekko’s pub-sub-mediator with type common.commands:shutdown
to request all actors in a namespace to shut down. The value of piggybackCommand/reason/type
must be
purge-namespace
; otherwise, the namespace’s actors will not stop themselves.
PUT /devops/piggyback?timeout=0
{
"targetActorSelection": "/system/distributedPubSubMediator",
"piggybackCommand": {
"type": "common.commands:shutdown",
"reason": {
"type": "purge-namespace",
"details": "namespaceToShutdown"
}
}
}
The shutdown command has no response because the number of actors shutting down can be very large.
The response will always be 408
timeout.
Feel free to send the shutdown command several times to make sure.
Erase all data in a namespace from the persistence
Send a piggyback command to Pekko’s pub-sub-mediator with type namespaces.commands:purgeNamespace
to erase all data from the persistence.
It is better to purge a namespace after
blocking it and
shutting down
all its actors so that no data is written in the namespace while erasing is ongoing.
The erasure may take a long time if the namespace has a lot of data associated with it or if the persistent storage is slow. Set the timeout to a safe margin above the estimated erasure time in milliseconds.
PUT /devops/piggyback?timeout=10s
{
"targetActorSelection": "/system/distributedPubSubMediator",
"headers": {
"aggregate": true,
"is-group-topic": true
},
"piggybackCommand": {
"type": "namespaces.commands:purgeNamespace",
"namespace": "namespaceToPurge"
}
}
The response contains results of the data purge, one for each resource type.
Note that to see responses from multiple resource types, the header aggregate
must not be false
.
{
"?": {
"?": {
"type": "namespaces.responses:purgeNamespace",
"status": 200,
"namespace": "namespaceToPurge",
"resourceType": "thing",
"successful": true
},
"?1": {
"type": "namespaces.responses:purgeNamespace",
"status": 200,
"namespace": "namespaceToPurge",
"resourceType": "policy",
"successful": true
},
"?2": {
"type": "namespaces.responses:purgeNamespace",
"status": 200,
"namespace": "namespaceToPurge",
"resourceType": "thing-search",
"successful": true
}
}
}
Unblock messages to a namespace
Send a piggyback command to Pekko’s pub-sub-mediator with type namespaces.commands:unblockNamespace
to stop blocking messages to a namespace.
PUT /devops/piggyback?timeout=10s
{
"targetActorSelection": "/system/distributedPubSubMediator",
"headers": {
"aggregate": false
},
"piggybackCommand": {
"type": "namespaces.commands:unblockNamespace",
"namespace": "namespaceToUnblock"
}
}
A response will come once the namespace’s blockade is released on all members of the Ditto cluster.
{
"type": "namespaces.responses:unblockNamespace",
"status": 200,
"namespace": "namespaceToUnblock",
"resourceType": "namespaces"
}