Airlock Microgateway components can act as a data source for Prometheus metrics for time-series-based real-time events and alert monitoring.
Prometheus can statically scrape metrics from configured Kubernetes resources or retrieve the scrape targets with service discovery. Since Microgateway can be scaled horizontally, a static configuration might be impractical. This article describes the configuration and gives an overview of available metrics. Note that a serviceMonitor
and podMonitor
configuration is required to scrape the Microgateway metrics.
- Additional articles that require a Prometheus installation and configuration:
- The article Monitor the licensed throughput shows a useful example of how Prometheus metrics can be used in a Grafana dashboard.
- The article Grafana dashboards for metric and log visualization gives an overview of the preconfigured Grafana dashboards that are delivered with the Microgateway Operator.
For security reasons, metrics usually should not be accessible outside your network. We strongly recommend setting appropriate network policies for metrics access.
To allow scraping metrics from web applications with injected Airlock Microgateway Engines, the application's corresponding metrics port should be excluded via a Pod annotation. Multiple ports can be excluded in a comma-separated list.
Example:sidecar.microgateway.airlock.com/excludeInboundPorts: "<YourWebApplicationMetricsPort>"