Available metrics in Prometheus format
This article lists exposed metrics, i.e., for monitoring licensed throughput and common indicator values. Prometheus supports different metric types such as counter, gauge, histogram, and summary.
Engine metrics
Metric name | Metric type | Description |
---|---|---|
Standard Envoy metrics – see Envoy documentation. | – | Note that metrics are named statistics in the Envoy online documentation: |
| gauge | Metric shows the static value Example: |
| counter | Number of total requests. |
| counter | Number of requests ( The metric has the following labels:
Example with deny rule-based blocked metric: Example microgateway_http_downstream_rq_threats_blocked_total{block_type="deny_rules", attack_type="XSS", envoy_cluster_name="YourClusterName"} A list of all available rule keys for deny rules can be found in the CR DenyRules reference documentation. See also article CR DenyRules for more information. Example with a limits-based blocked metric: Example microgateway_http_downstream_rq_threats_blocked_total{block_type="limits", attack_type="parameter_body_size", envoy_cluster_name="YourClusterName"} The article CR Limits provides further information for limit-based blocks and potential blocks (in LogOnly mode). |
| counter | Number of responses ( The metric has the following labels:
Example with OpenAPI-based blocked metric: Example microgateway_http_downstream_rs_threats_blocked_total{block_type="openapi", attack_type="OpenAPIViolation", envoy_cluster_name="YourClusterName"} |
| counter | Number of ( The metric has the following labels:
Example with deny rule-based potential logged metric: Example microgateway_http_downstream_rq_threats_logged_total{block_type="deny_rules", attack_type="xss", envoy_cluster_name="YourClusterName"} A list of all available rule keys for deny rules can be found in the CR DenyRules reference documentation. See also article CR DenyRules for more information. Example with a limits-based logged metric: Example microgateway_http_downstream_rq_threats_logged_total{block_type="limits", attack_type="bodySize", envoy_cluster_name="YourClusterName"} The article CR Limits provides further information for limit-based blocks and potential blocks (in LogOnly mode). |
| counter | Number of response ( The metric has the following labels:
Example with OpenAPI-based loggedmetric: Example microgateway_http_downstream_rs_threats_logged_total{block_type="openapi", attack_type="OpenAPIViolation", envoy_cluster_name="YourClusterName"} |
| histogram | Time in milliseconds between the first received downstream byte and the last sent upstream byte of a request. |
| histogram | Time in milliseconds between the first received upstream byte and the last sent downstream byte of a response. |
| histogram | Time in milliseconds between the last request byte sent upstream to the first response byte received from upstream. |
Operator metrics
Metric name | Metric type | Description |
---|---|---|
| gauge | Metric shows the static value 1, labeled by the Migrogateway Operator version information. Example: |
| gauge | The number of injected Airlock Microgateway Engine sidecars managed by this Operator instance. |
| gauge | The licensed sidecar count. A value of |
| gauge | Whether the Airlock Microgateway Operator has a valid license |
| gauge | The licensed request count per month. When using the community edition license, no monthly count is available, but instead the value |
| gauge | Whether the active license (if any) is a premium license |
| gauge | (Unix) timestamp when the active license expires. |
- 1
License-related metric. See also Configuring and monitoring licenses article.
Note that when the license changes, the metrics are updated and thelicense status changed
is logged. This can take up to 1 minute after the secret is adjusted since Kubernetes updates mounted config maps only periodically.
Further information and links
Internal links:
External links: