-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
holepunching: expose metrics #2103
Comments
Just brainstorming, not saying we should track all of the following:
I think the following would make a great start:
|
@dennis-tra do you think this info is not useful without the peers agent version? |
@sukunrt I think what I wanted to say is that we wouldn't be able to act on e.g., a degraded success rate because we didn't correlate it with something else. "Something else" could be the agent version (as I mentioned above), but it could also be another property like hasActivePortMapping or isCGNAT'd, etc. But I would step back from my above statement because it would still be useful to know if the distribution of hole punch outcomes changes over time. |
tracking agent version is a difficult since it's a user controlled field, so an attacker can generate lots of agent versions which would lead to creation of a lot of prometheus time series on our end. I propose the following set of metrics in the first cut:
|
We should:
@dennis-tra Are there any more Prometheus metrics you think would be helpful to have on a dashboard?
The text was updated successfully, but these errors were encountered: