Escalation policy

Condensed incident routing guidance for issues discovered through the portal, observability views and related access checks.

SEV-1SEV-2SEV-3

Severity model

  • SEV-3 โ€” cosmetic issues, minor documentation drift or isolated stale labels.
  • SEV-2 โ€” repeated degraded health states, ingress/TLS metadata issues or registry update lag.
  • SEV-1 โ€” overview unavailable, broad ingress failure, or access behavior inconsistent with policy.

Routing guidance

Issue patternPrimary ownerNotes
Node pressure, scheduling driftPlatform / cluster operationsCheck node details and related events first.
Ingress, routing or TLS symptomsNetworking / edgeUse service and observability views together.
Policy denial or access mismatchSecurity / access ownerCompare expected path, role intent and endpoint behavior.

Operator handoff

When escalating, include object name, namespace, affected image or node when relevant, the most recent warning pattern and the next path already checked. That shortens time-to-ownership significantly.