Transform all documentation from modular monolith to true microservices
architecture where core services are independently deployable.
Key Changes:
- Core Kernel: Infrastructure only (no business logic)
- Core Services: Auth, Identity, Authz, Audit as separate microservices
- Each service has own entry point (cmd/{service}/)
- Each service has own gRPC server and database schema
- Services register with Consul for service discovery
- API Gateway: Moved from Epic 8 to Epic 1 as core infrastructure
- Single entry point for all external traffic
- Handles routing, JWT validation, rate limiting, CORS
- Service Discovery: Consul as primary mechanism (ADR-0033)
- Database Pattern: Per-service connections with schema isolation
Documentation Updates:
- Updated all 9 architecture documents
- Updated 4 ADRs and created 2 new ADRs (API Gateway, Service Discovery)
- Rewrote Epic 1: Core Kernel & Infrastructure (infrastructure only)
- Rewrote Epic 2: Core Services (Auth, Identity, Authz, Audit as services)
- Updated Epic 3-8 stories for service architecture
- Updated plan.md, playbook.md, requirements.md, index.md
- Updated all epic READMEs and story files
New ADRs:
- ADR-0032: API Gateway Strategy
- ADR-0033: Service Discovery Implementation (Consul)
New Stories:
- Epic 1.7: Service Client Interfaces
- Epic 1.8: API Gateway Implementation
4.3 KiB
4.3 KiB
Story 2.5: Audit Service - Audit Logging
Metadata
- Story ID: 2.5
- Title: Audit Service - Audit Logging
- Epic: 2 - Core Services (Authentication & Authorization)
- Status: Pending
- Priority: High
- Estimated Time: 6-8 hours
- Dependencies: 1.1, 1.2, 1.5, 1.7
Goal
Implement Audit Service as an independent microservice for audit logging. The service exposes a gRPC server, manages its own database connection with AuditLog entity, and registers with Consul service registry.
Description
This story implements the Audit Service as a separate, independently deployable microservice. It includes audit log recording and querying via gRPC. The service has its own entry point, database connection with AuditLog entity schema, and service registration. Other services use AuditServiceClient to record audit events.
Deliverables
1. Service Entry Point (cmd/audit-service/main.go)
- Independent service entry point
- Bootstrap with core kernel services
- Register with Consul service registry
- Start gRPC server on configured port (default: 8084)
- Graceful shutdown with service deregistration
2. gRPC Service Definition (api/proto/audit.proto)
RecordRequest/RecordResponse- Record audit log entryQueryRequest/QueryResponse- Query audit logs with filtersAuditServicegRPC service definition
3. gRPC Server Implementation (services/audit/internal/api/server.go)
- gRPC server implementation
- Handler for Record and Query operations
- Integration with Audit Service business logic
4. Audit Service Implementation (services/audit/internal/service/audit_service.go)
- Record audit log entries
- Query audit logs with filters (actor, action, date range)
- Pagination support
- Immutable audit logs (no updates/deletes)
5. Audit Interface (pkg/services/audit.go)
AuditServiceClientinterface (defined in Epic 1, Story 1.7)Record(ctx, action)methodQuery(ctx, filters)methodAuditActionstruct with actor, action, target, metadata
6. Database Connection and Schema (services/audit/ent/schema/audit_log.go)
- Audit Service database connection (schema:
audit) - AuditLog entity schema:
- ID, actor_id, action, target_id, metadata (JSONB), timestamp
- Immutable (no update/delete operations)
- Migration support
- Per-service connection pool
7. Service Registration
- Register with Consul on startup
- Health check endpoint for Consul
- Service metadata (name:
audit-service, port: 8084) - Deregister on shutdown
Acceptance Criteria
- Audit Service is independently deployable
- Service entry point exists at
cmd/audit-service/main.go - Service registers with Consul on startup
- gRPC server starts on configured port (8084)
- Record RPC stores audit log entries
- Query RPC retrieves audit logs with filters
- Audit logs include complete context (actor, action, target, metadata)
- Audit logs are immutable (no updates/deletes)
- Service has its own database connection (audit schema)
- AuditLog entity schema is defined and migrated
- Other services can use AuditServiceClient to record events
- Service can be discovered by other services via Consul
- Health check endpoint works for Consul
Related ADRs
- ADR-0020: Audit Logging Storage
- ADR-0029: Microservices Architecture
- ADR-0030: Service Communication Strategy
- ADR-0033: Service Discovery Implementation
Testing
# Test Audit Service
go test ./services/audit/...
# Test service startup
go run cmd/audit-service/main.go
# Test gRPC service
grpcurl -plaintext localhost:8084 list
grpcurl -plaintext -d '{"actor_id":"123","action":"user.login","target_id":"user-123"}' \
localhost:8084 audit.AuditService/Record
Files to Create/Modify
cmd/audit-service/main.go- Service entry pointapi/proto/audit.proto- gRPC service definitionservices/audit/internal/api/server.go- gRPC server implementationservices/audit/internal/service/audit_service.go- Audit service logicservices/audit/ent/schema/audit_log.go- AuditLog entity schemaconfig/default.yaml- Add audit service configuration