From 0a1982b294bade24dd7b068341508cee807f29c4 Mon Sep 17 00:00:00 2001 From: Aliaksandr Valialkin Date: Tue, 19 Oct 2021 15:29:07 +0300 Subject: [PATCH] app/vmauth: fix metric name prefixes: `vmagent` -> `vmauth` --- app/vmauth/main.go | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/app/vmauth/main.go b/app/vmauth/main.go index 22cd16ae56..71ac9fb34e 100644 --- a/app/vmauth/main.go +++ b/app/vmauth/main.go @@ -23,7 +23,7 @@ var ( maxIdleConnsPerBackend = flag.Int("maxIdleConnsPerBackend", 100, "The maximum number of idle connections vmauth can open per each backend host") reloadAuthKey = flag.String("reloadAuthKey", "", "Auth key for /-/reload http endpoint. It must be passed as authKey=...") logInvalidAuthTokens = flag.Bool("logInvalidAuthTokens", false, "Whether to log requests with invalid auth tokens. "+ - `Such requests are always counted at vmagent_http_request_errors_total{reason="invalid_auth_token"} metric, which is exposed at /metrics page`) + `Such requests are always counted at vmauth_http_request_errors_total{reason="invalid_auth_token"} metric, which is exposed at /metrics page`) ) func main() { @@ -109,9 +109,9 @@ func proxyRequest(w http.ResponseWriter, r *http.Request) { } var ( - configReloadRequests = metrics.NewCounter(`vmagent_http_requests_total{path="/-/reload"}`) - invalidAuthTokenRequests = metrics.NewCounter(`vmagent_http_request_errors_total{reason="invalid_auth_token"}`) - missingRouteRequests = metrics.NewCounter(`vmagent_http_request_errors_total{reason="missing_route"}`) + configReloadRequests = metrics.NewCounter(`vmauth_http_requests_total{path="/-/reload"}`) + invalidAuthTokenRequests = metrics.NewCounter(`vmauth_http_request_errors_total{reason="invalid_auth_token"}`) + missingRouteRequests = metrics.NewCounter(`vmauth_http_request_errors_total{reason="missing_route"}`) ) var reverseProxy = &httputil.ReverseProxy{