Skip to content

Latest commit

 

History

History
217 lines (141 loc) · 9.04 KB

README.md

File metadata and controls

217 lines (141 loc) · 9.04 KB

Central Event Processor Service

Git Commit Git Releases Docker pulls CircleCI

The Central Event Processor (CEP) service provides the capability to monitor for a pre-defined/configured set of business rules or patterns such as breaching the threshold set for a particular limit (or Net Debit Cap) or a Position Adjustment based on a Settlement.

In the current iteration, the rules are set to monitor for three criteria:

  1. Breaching of a threshold on the Limit of Net Debit Cap (which may be set as part of on-boarding)
  2. Adjustment of the limit - Net Debit Cap
  3. Adjust of position based on a Settlement.

The CEP can then be integrated with a notifier service, to send out notifications or alerts. In this instance, it integrates with the email-notifier to send out alerts based on the aforementioned criteria.

Contents

Todo

  • Improve code-coverage to 90% across the board: .nycrc.yml. Don't forget to un-comment out the code-coverage options & rules.

Deployment

See the onboarding guide for running the service locally.

Notes

Tasks

  • send notifications when current position breaches the limit threshold value after a successful transfer was commited
  • send notifications when the limit was adjusted
  • make it extendable and flexible

Reacts on

  • messages consumed from the notification topic
  • data read from the central-ledger API

Used technologies

Local storage

  • Mongo DB
  • Mongoose is used for schema validations and ORM functions
  • to set up connection the following environmental variables might be used: CEP_DATABASE_URI and CEP_DATABASE_NAME
  • full database documentation can be found at Mojaloop central notifications Database

Architecture overview

architecture

Architecture Overview

This is standalone service which is connected to Kafka Notification topic into the mojaloop environemnt and monitors the topic for messages which match certain rules and takes actions accordingly.

The service is developed using RxJS for observing the system and acting accordingly. The decisions for actions are taken by the json-rule-engine.

Architecture and Technologies Overview

ArchTechOverview

Architecture and Technologies Overview

General process overview

process

Process Overview

The rules validations are triggered upon commited transfers. As soon as a commited transfer notification is produced from the central-ledger to the notification topic, the central-notifications service picks it up, gathers more information, runs few rules validations and acts based on rules engine outcome.

The data for performing rules validation is requested from the central-ledger admin API calls using observables, available here some mapping and wiring is done through below enums properties:

enums

const notificationActionMap = {
  NET_DEBIT_CAP_THRESHOLD_BREACH_EMAIL: {
    enum: 'NET_DEBIT_CAP_THRESHOLD_BREACH_EMAIL',
    action: 'sendEmail',
    templateType: 'breach',
    language: 'en'
  },
  NET_DEBIT_CAP_ADJUSTMENT_EMAIL: {
    enum: 'NET_DEBIT_CAP_ADJUSTMENT_EMAIL',
    action: 'sendEmail',
    templateType: 'adjustment',
    language: 'en'
  }
}

const limitNotificationMap = {
  NET_DEBIT_CAP: {
    enum: 'NET_DEBIT_CAP',
    NET_DEBIT_CAP_THRESHOLD_BREACH_EMAIL: notificationActionMap.NET_DEBIT_CAP_THRESHOLD_BREACH_EMAIL,
    NET_DEBIT_CAP_ADJUSTMENT_EMAIL: notificationActionMap.NET_DEBIT_CAP_ADJUSTMENT_EMAIL
  }
}

Rules

Currently two separate Rules are validated:

  1. Limit Adjustment Rule
  2. Limit Position Threshold Breach Rule

In the current implementation for each separate rule, an observable has to be created, like the couple above, and configured when and how to trigger it into the setup The Rules outputs should be chained to common Action Agent.

Config

The default config

To use Environmental Variables for MongoDB URI and database name use: CEP_MONGO_URI and CEP_MONGO_DATABASE

Limit Adjustment Rules flow

limitAdjustment

Limit Adjustment Rules flow

This rule is triggered on each limit response from the central-ledger admin API.

Limit Position Threshold Breach flow

limitPositionThresholdBreach

Limit Position Threshold Breach flow

This rule is triggered when all data for the participants in the current transfer is received.

Actions Agent flow

actionAgent

Actions Agent flow

The Action Agent - takes care of action preparation regrding the data from central-ledger admin API and various settings.

Scheduler flow

schedulerFlow

Scheduler flow

The scheduler coordinates the Action Object that requires to be dispatched. It would typically action a scheduled event that qualifies by insure only the prescribed number of notifications are dispatched within the set time frame defined.

Notifier flow (separate service)

notifier

Notifier flow

Email notifier service is a separate app, that observes the same topic for messages with field from = SYSTEM. Its code is available in the email-notifier repository.

Auditing Dependencies

We use npm-audit-resolver along with npm audit to check dependencies for node vulnerabilities, and keep track of resolved dependencies with an audit-resolve.json file.

To start a new resolution process, run:

npm run audit:resolve

You can then check to see if the CI will pass based on the current dependencies with:

npm run audit:check

And commit the changed audit-resolve.json to ensure that CircleCI will build correctly.

Container Scans

As part of our CI/CD process, we use anchore-cli to scan our built docker container for vulnerabilities upon release.

If you find your release builds are failing, refer to the container scanning in our shared Mojaloop CI config repo. There is a good chance you simply need to update the mojaloop-policy-generator.js file and re-run the circleci workflow.

For more information on anchore and anchore-cli, refer to: