Prometheus metrics exposed by pods in VIP Authentication Hub
search cancel

Prometheus metrics exposed by pods in VIP Authentication Hub

book

Article ID: 301102

calendar_today

Updated On:

Products

VIP Authentication Hub

Issue/Introduction


Is there a way to test if auth-mgr pod is exposing ssp_auth_total from Hazelcast, maybe doing a curl xxx/metrics command?

When trying to access it by the Ingress service, the command receives an invalid vanity host. And when to trying to access it by the pod IP, it does not work.

 

Resolution


Some services (e.g. opa) expose the metrics on /metrics and all springboot services (e.g. auth-mgr, factors, etc...) expose the metrics on /actuator/prometheus. The SSP creates servicemonitors that look for these endpoints based on labels.

Set the annotations like this:

  prometheus.io/scrape: "true" prometheus.io/port: "https"
  prometheus.io/path: "/metrics or /actuator/prometheus"

The documentation states that setting ssp-prometheus-metrics to either actuator or metrics will publish all metrics in one path or another.