This article lists exposed metrics, i.e., for monitoring licensed throughput and common indicator values. Prometheus supports different metric types such as counter, gauge, histogram, and summary.
Engine metrics
Metric name | Metric type | Description |
---|---|---|
Standard Envoy metrics – see Envoy documentation. | – |
|
| gauge | Metric shows the static value Example: |
| counter | Number of total requests. |
| counter | Number of requests (
Example with deny rule-based blocked metric: microgateway_http_downstream_rq_threats_blocked_total{block_type="deny_rules", attack_type="XSS", envoy_cluster_name="YourClusterName"} A list of all available rule keys for deny rules can be found in the CR DenyRules reference documentation. See also article CR DenyRules for more information. Example with a limits-based blocked metric: microgateway_http_downstream_rq_threats_blocked_total{block_type="limits", attack_type="parameter_body_size", envoy_cluster_name="YourClusterName"} The article CR Limits provides further information for limit-based blocks and potential blocks (in LogOnly mode). |
| counter | Number of responses (
Example with OpenAPI-based blocked metric: microgateway_http_downstream_rs_threats_blocked_total{block_type="openapi", attack_type="OpenAPIViolation", envoy_cluster_name="YourClusterName"} |
| counter | Number of (
Example with deny rule-based potential logged metric: microgateway_http_downstream_rq_threats_logged_total{block_type="deny_rules", attack_type="xss", envoy_cluster_name="YourClusterName"} A list of all available rule keys for deny rules can be found in the CR DenyRules reference documentation. See also article CR DenyRules for more information. Example with a limits-based logged metric: microgateway_http_downstream_rq_threats_logged_total{block_type="limits", attack_type="bodySize", envoy_cluster_name="YourClusterName"} The article CR Limits provides further information for limit-based blocks and potential blocks (in LogOnly mode). |
| counter | Number of response (
Example with OpenAPI-based loggedmetric: microgateway_http_downstream_rs_threats_logged_total{block_type="openapi", attack_type="OpenAPIViolation", envoy_cluster_name="YourClusterName"} |
| histogram | Time in milliseconds between the first received downstream byte and the last sent upstream byte of a request. |
| histogram | Time in milliseconds between the first received upstream byte and the last sent downstream byte of a response. |
| histogram | Time in milliseconds between the last request byte sent upstream to the first response byte received from upstream. |
Operator metrics
Metric name | Metric type | Description |
---|---|---|
| gauge | Metric shows the static value 1, labeled by the Migrogateway Operator version information. Example: |
| gauge | The number of injected Airlock Microgateway Engine sidecars managed by this Operator instance. |
| gauge | The licensed sidecar count. A value of |
| gauge | Whether the Airlock Microgateway Operator has a valid license |
| gauge | The licensed request count per month. When using the community edition license, no monthly count is available, but instead the value |
| gauge | Whether the active license (if any) is a premium license |
| gauge | (Unix) timestamp when the active license expires. |
1 | License-related metric. See also Configuration and monitoring of licenses article. |
Further information and links
- Internal links:
- Using Microgateway Prometheus metrics
- External links:
- Istio - merging Prometheus metrics