diff --git a/app/vmauth/main.go b/app/vmauth/main.go index 22cd16ae56..71ac9fb34e 100644 --- a/app/vmauth/main.go +++ b/app/vmauth/main.go @@ -23,7 +23,7 @@ var ( maxIdleConnsPerBackend = flag.Int("maxIdleConnsPerBackend", 100, "The maximum number of idle connections vmauth can open per each backend host") reloadAuthKey = flag.String("reloadAuthKey", "", "Auth key for /-/reload http endpoint. It must be passed as authKey=...") logInvalidAuthTokens = flag.Bool("logInvalidAuthTokens", false, "Whether to log requests with invalid auth tokens. "+ - `Such requests are always counted at vmagent_http_request_errors_total{reason="invalid_auth_token"} metric, which is exposed at /metrics page`) + `Such requests are always counted at vmauth_http_request_errors_total{reason="invalid_auth_token"} metric, which is exposed at /metrics page`) ) func main() { @@ -109,9 +109,9 @@ func proxyRequest(w http.ResponseWriter, r *http.Request) { } var ( - configReloadRequests = metrics.NewCounter(`vmagent_http_requests_total{path="/-/reload"}`) - invalidAuthTokenRequests = metrics.NewCounter(`vmagent_http_request_errors_total{reason="invalid_auth_token"}`) - missingRouteRequests = metrics.NewCounter(`vmagent_http_request_errors_total{reason="missing_route"}`) + configReloadRequests = metrics.NewCounter(`vmauth_http_requests_total{path="/-/reload"}`) + invalidAuthTokenRequests = metrics.NewCounter(`vmauth_http_request_errors_total{reason="invalid_auth_token"}`) + missingRouteRequests = metrics.NewCounter(`vmauth_http_request_errors_total{reason="missing_route"}`) ) var reverseProxy = &httputil.ReverseProxy{