Auto Mitigation (Control Signal)
Question this page answers: How can I isolate key-error bursts to a single scope instead of impacting all traffic?
Core concept
Section titled “Core concept”- One-line definition:
CryptoCircuitControllerchanges circuit state per scope from crypto failure metrics. - Why it matters: one tenant/provider/key incident should not degrade unrelated traffic.
- Configuration example (
safe): scope=tenant+provider+kid, auto-open only for key/AAD/kid mismatch classes. - Common mistake: treating all generic network errors as circuit-open triggers.
State machine
Section titled “State machine”closed: normal pathopen: isolate scope after threshold breachhalf-open: probe after cooldownclosed: recover after successful operation
Operational events
Section titled “Operational events”- Structured event fields: state, scope, reason, errorClass
- Metrics:
crypto_circuit_state,crypto_circuit_open_count - Runbook callback: trigger operator workflow on open transition
Risk labels
Section titled “Risk labels”safe: auto-open only key-related classescaution: too-low threshold causes noisy isolationunsafe: global isolation with no scope key