Age | Commit message (Collapse) | Author | |
---|---|---|---|
2023-10-18 | add metrics for rejected BEGIN/RESOLVE | trinity-1686a | |
2023-05-25 | Added relay prefix to new metrics functions | friendly73 | |
2023-05-25 | Fixed new arguments for metrics_store_add | friendly73 | |
2023-05-25 | Removed getter abstraction and moved from rephist to relay_metrics. | friendly73 | |
2023-05-25 | Fixed REND1 metric label value | friendly73 | |
2023-05-25 | Added INTRO and REND metrics for relay. | friendly73 | |
2023-05-24 | metrics: Add ticket 40546 changes file and code fix | David Goulet | |
The MR was using an old function definition so the code fix is for that. Closes #40546 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2023-05-24 | Merge branch 'tor-gitlab/mr/698' | David Goulet | |
2023-03-19 | don't emit key expiration metric instead of setting it to zero | trinity-1686a | |
2023-03-13 | metrics: Add support for histograms. | Gabriela Moldovan | |
This will enable us to add e.g. circuit build metrics (#40717). Signed-off-by: Gabriela Moldovan <gabi@torproject.org> | |||
2023-03-06 | add new metrics entry for cert expiration | trinity-1686a | |
2022-12-07 | metrics: Fix typo in a label | David Goulet | |
Fixes #40727 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-12-02 | Ticket 40724: Add metrics for CC circuit counts | Mike Perry | |
2022-12-01 | Ticket 40724: Additional congestion control metrics | Mike Perry | |
2022-11-10 | metrics: Split cc with counters and gauges | David Goulet | |
Part of #40712 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-11-10 | metrics: Split connections with a counter and gauge | David Goulet | |
Created and Rejected connections are ever going up counters. While Opened connections are gauges going up and down. Fixes #40712 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-11-09 | Merge branch 'tor-gitlab/mr/654' into maint-0.4.7 | David Goulet | |
2022-11-09 | metrics: Reorganize state labels so rate() can be applied | Mike Perry | |
Part of #40708. | |||
2022-11-08 | Merge branch 'tor-gitlab/mr/651' into maint-0.4.7 | David Goulet | |
2022-11-08 | metrics: Record percentage of blocked channels | Mike Perry | |
Part of #40708. | |||
2022-11-08 | metrics: Report amount of cwnd drop from delta and gamma | Mike Perry | |
Part of #40708. | |||
2022-11-07 | metrics: Add flow control metrics. | Mike Perry | |
Part of #40708. | |||
2022-11-07 | metrics: Add stats when the clock stalls. | Mike Perry | |
Part of #40708. | |||
2022-11-07 | metrics: Add running average of CC cwnd in slow start when closing circuit | Mike Perry | |
Count slow start separately. Part of #40708 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-11-07 | metrics: Add stats when reaching vegas delta or ss_cwnd_max | David Goulet | |
Part of #40708 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-11-07 | metrics: Add running average of CC cwnd when closing circuit | David Goulet | |
Part of #40708 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-11-07 | metrics: Add running average of CC cwnd when exiting slow start | David Goulet | |
Part of #40708 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-11-03 | metrics: Add connection socket family to metrics | David Goulet | |
Adds either ipv4 or ipv6 to the "tor_relay_connections_total" stats. Closes #40710 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-11-03 | metrics: Add stats for num circ reaching max cell outq | David Goulet | |
Part of #40708 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-10-27 | Merge branch 'tor-gitlab/mr/644' into maint-0.4.7 | David Goulet | |
2022-10-27 | metrics: Treat relay connections as gauge, not counter | David Goulet | |
Fixes #40699 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-10-27 | metrics: Add number of opened circuits to MetricsPort | David Goulet | |
Related to #40194 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-10-27 | relay: Add our consensus relay flag to MetricsPort | David Goulet | |
Related to #40194 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-10-27 | metrics: Add traffic related stats to MetricsPort | David Goulet | |
At this commit, bytes read and written are exported. Related to #40194 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-10-27 | relay: Add DoS subsystem stats to MetricsPort | David Goulet | |
Related to #40194 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-10-27 | metrics: Fix naming and documentation | David Goulet | |
After nickm's review, minor changes to names and comments. Related to #40194 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-10-26 | relay: Change the connection metrics name | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-10-26 | relay: Add CC RTT reset stats to MetricsPort | David Goulet | |
Related to #40194 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-10-26 | relay: Add total number of streams seen on MetricsPort | David Goulet | |
Related to #40194 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-10-12 | relay: Add number of rejected connections to MetricsPort | David Goulet | |
Related to #40194 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-10-12 | relay: Add connection stats to MetricsPort | David Goulet | |
This adds the number of created and opened connections to the MetricsPort for a relay for each connection type and direction. Output looks like: # HELP tor_relay_connections Connections metrics of this relay # TYPE tor_relay_connections counter tor_relay_connections{type="OR listener",direction="initiated",state="created"} 0 tor_relay_connections{type="OR listener",direction="received",state="created"} 0 tor_relay_connections{type="OR listener",direction="initiated",state="opened"} 0 tor_relay_connections{type="OR listener",direction="received",state="opened"} 0 tor_relay_connections{type="OR",direction="initiated",state="created"} 5 tor_relay_connections{type="OR",direction="received",state="created"} 0 tor_relay_connections{type="OR",direction="initiated",state="opened"} 5 tor_relay_connections{type="OR",direction="received",state="opened"} 0 tor_relay_connections{type="Exit",direction="initiated",state="created"} 0 tor_relay_connections{type="Exit",direction="received",state="created"} 0 tor_relay_connections{type="Exit",direction="initiated",state="opened"} 0 tor_relay_connections{type="Exit",direction="received",state="opened"} 0 tor_relay_connections{type="Socks listener",direction="initiated",state="created"} 0 tor_relay_connections{type="Socks listener",direction="received",state="created"} 0 tor_relay_connections{type="Socks listener",direction="initiated",state="opened"} 0 tor_relay_connections{type="Socks listener",direction="received",state="opened"} 0 tor_relay_connections{type="Socks",direction="initiated",state="created"} 0 tor_relay_connections{type="Socks",direction="received",state="created"} 0 tor_relay_connections{type="Socks",direction="initiated",state="opened"} 0 tor_relay_connections{type="Socks",direction="received",state="opened"} 0 tor_relay_connections{type="Directory listener",direction="initiated",state="created"} 0 tor_relay_connections{type="Directory listener",direction="received",state="created"} 0 tor_relay_connections{type="Directory listener",direction="initiated",state="opened"} 0 tor_relay_connections{type="Directory listener",direction="received",state="opened"} 0 tor_relay_connections{type="Directory",direction="initiated",state="created"} 0 tor_relay_connections{type="Directory",direction="received",state="created"} 0 tor_relay_connections{type="Directory",direction="initiated",state="opened"} 0 tor_relay_connections{type="Directory",direction="received",state="opened"} 0 tor_relay_connections{type="Control listener",direction="initiated",state="created"} 0 tor_relay_connections{type="Control listener",direction="received",state="created"} 0 tor_relay_connections{type="Control listener",direction="initiated",state="opened"} 0 tor_relay_connections{type="Control listener",direction="received",state="opened"} 0 tor_relay_connections{type="Control",direction="initiated",state="created"} 0 tor_relay_connections{type="Control",direction="received",state="created"} 0 tor_relay_connections{type="Control",direction="initiated",state="opened"} 0 tor_relay_connections{type="Control",direction="received",state="opened"} 0 tor_relay_connections{type="Transparent pf/netfilter listener",direction="initiated",state="created"} 0 tor_relay_connections{type="Transparent pf/netfilter listener",direction="received",state="created"} 0 tor_relay_connections{type="Transparent pf/netfilter listener",direction="initiated",state="opened"} 0 tor_relay_connections{type="Transparent pf/netfilter listener",direction="received",state="opened"} 0 tor_relay_connections{type="Transparent natd listener",direction="initiated",state="created"} 0 tor_relay_connections{type="Transparent natd listener",direction="received",state="created"} 0 tor_relay_connections{type="Transparent natd listener",direction="initiated",state="opened"} 0 tor_relay_connections{type="Transparent natd listener",direction="received",state="opened"} 0 tor_relay_connections{type="DNS listener",direction="initiated",state="created"} 0 tor_relay_connections{type="DNS listener",direction="received",state="created"} 0 tor_relay_connections{type="DNS listener",direction="initiated",state="opened"} 0 tor_relay_connections{type="DNS listener",direction="received",state="opened"} 0 tor_relay_connections{type="Extended OR",direction="initiated",state="created"} 0 tor_relay_connections{type="Extended OR",direction="received",state="created"} 0 tor_relay_connections{type="Extended OR",direction="initiated",state="opened"} 0 tor_relay_connections{type="Extended OR",direction="received",state="opened"} 0 tor_relay_connections{type="Extended OR listener",direction="initiated",state="created"} 0 tor_relay_connections{type="Extended OR listener",direction="received",state="created"} 0 tor_relay_connections{type="Extended OR listener",direction="initiated",state="opened"} 0 tor_relay_connections{type="Extended OR listener",direction="received",state="opened"} 0 tor_relay_connections{type="HTTP tunnel listener",direction="initiated",state="created"} 0 tor_relay_connections{type="HTTP tunnel listener",direction="received",state="created"} 0 tor_relay_connections{type="HTTP tunnel listener",direction="initiated",state="opened"} 0 tor_relay_connections{type="HTTP tunnel listener",direction="received",state="opened"} 0 tor_relay_connections{type="Metrics listener",direction="initiated",state="created"} 0 tor_relay_connections{type="Metrics listener",direction="received",state="created"} 1 tor_relay_connections{type="Metrics listener",direction="initiated",state="opened"} 0 tor_relay_connections{type="Metrics listener",direction="received",state="opened"} 1 tor_relay_connections{type="Metrics",direction="initiated",state="created"} 0 tor_relay_connections{type="Metrics",direction="received",state="created"} 0 tor_relay_connections{type="Metrics",direction="initiated",state="opened"} 0 tor_relay_connections{type="Metrics",direction="received",state="opened"} 0 Related to #40194 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2022-02-22 | Implement core of ntor3 negotiation. | Nick Mathewson | |
There are a lot of TODOs about what to send, whom to send it to, and etc. | |||
2021-12-13 | relay: Change DNS timeout label on MetricsPort | David Goulet | |
Change it from "timeout" to "tor_timeout" in order to indicate that the DNS timeout is one from tor's DNS threshold and not the DNS server itself. Fixes #40527 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2021-10-20 | relay: Comment out a unused variable for now | David Goulet | |
We keep it around until libevent is fixed, it should be used again. In the meantime, avoid the compiler to complain of this unused variable. https://gitlab.torproject.org/dgoulet/tor/-/jobs/43358#L1522 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2021-10-20 | relay: Avoid duplicate MetricsPort DNS error | David Goulet | |
We don't output per-type DNS errors anymore so avoid looping over the DNS query type and output each errors for them. Before this commit, it created 3x the same message because we had A, AAAA and PTR type records. Fix on previous commit e7abab878241592e Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2021-10-20 | relay: For metrics, don't report DNS errors by query type | David Goulet | |
This is due to the libevent bug https://github.com/libevent/libevent/issues/1219 that fails to return back the DNS record type on error. And so, the MetricsPort now only reports the errors as a global counter and not a per record type. Closes #40490 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2021-05-12 | rephist: Add a counter for the onioniskins stats | David Goulet | |
Current counters are reset every heartbeat. This commit adds two counters for the assigned and dropped onionskins that are not reset so they can be exported onto the MetricsPort. Closes #40387 Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2021-05-12 | metrics: One relay metrics was not using metrics_format_label() | David Goulet | |
This resulted in the labels not being surrounded by double quotes and thus Prometheus not liking it. Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2021-05-12 | relay: Add TCP port exhaustion metrics | David Goulet | |
Signed-off-by: David Goulet <dgoulet@torproject.org> | |||
2021-05-12 | relay: Add DNS metrics | David Goulet | |
Emit on the MetricsPort all the DNS statistics we have that is the total number of queries seen and errors per record type. Related to #40367 Signed-off-by: David Goulet <dgoulet@torproject.org> |