mirror of https://github.com/istio/istio.io.git
fix(observability): remove outdated info from concept doc (#7289)
This commit is contained in:
parent
22bc9c4076
commit
cccdaa704f
|
@ -111,13 +111,10 @@ istio_requests_total{
|
|||
|
||||
### Control plane metrics
|
||||
|
||||
Each Istio component (Pilot, Galley, Mixer) also provides a collection of self-monitoring metrics. These metrics allow monitoring of the behavior
|
||||
The Istio control plane also provides a collection of self-monitoring metrics. These metrics allow monitoring of the behavior
|
||||
of Istio itself (as distinct from that of the services within the mesh).
|
||||
|
||||
For more information on which metrics are maintained, please refer to the reference documentation for each of the components:
|
||||
|
||||
- [Pilot](/docs/reference/commands/pilot-discovery/#metrics)
|
||||
- [Mixer](/docs/reference/commands/mixs/#metrics)
|
||||
For more information on which metrics are maintained, please refer to the [reference documentation](/docs/reference/commands/pilot-discovery/#metrics).
|
||||
|
||||
## Distributed traces
|
||||
|
||||
|
@ -143,10 +140,10 @@ Example Istio-generated distributed trace for a single request:
|
|||
Access logs provide a way to monitor and understand behavior from the perspective of an individual workload instance.
|
||||
|
||||
Istio can generate access logs for service traffic in a configurable set of formats, providing operators with full control of the how, what, when and where of
|
||||
logging. Istio exposes a full set of source and destination metadata to the access logging mechanisms, allowing detailed audit of network transactions.
|
||||
logging. For more information, please refer to [Getting Envoy's Access Logs](/docs/tasks/observability/logs/access-log/).
|
||||
|
||||
Example Istio access log (formatted in JSON):
|
||||
Example Istio access log:
|
||||
|
||||
{{< text json >}}
|
||||
{"level":"info","time":"2019-06-11T20:57:35.424310Z","instance":"accesslog.instance.istio-control","connection_security_policy":"mutual_tls","destinationApp":"productpage","destinationIp":"10.44.2.15","destinationName":"productpage-v1-6db7564db8-pvsnd","destinationNamespace":"default","destinationOwner":"kubernetes://apis/apps/v1/namespaces/default/deployments/productpage-v1","destinationPrincipal":"cluster.local/ns/default/sa/default","destinationServiceHost":"productpage.default.svc.cluster.local","destinationWorkload":"productpage-v1","httpAuthority":"35.202.6.119","latency":"35.076236ms","method":"GET","protocol":"http","receivedBytes":917,"referer":"","reporter":"destination","requestId":"e3f7cffb-5642-434d-ae75-233a05b06158","requestSize":0,"requestedServerName":"outbound_.9080_._.productpage.default.svc.cluster.local","responseCode":200,"responseFlags":"-","responseSize":4183,"responseTimestamp":"2019-06-11T20:57:35.459150Z","sentBytes":4328,"sourceApp":"istio-ingressgateway","sourceIp":"10.44.0.8","sourceName":"ingressgateway-7748774cbf-bvf4j","sourceNamespace":"istio-control","sourceOwner":"kubernetes://apis/apps/v1/namespaces/istio-control/deployments/ingressgateway","sourcePrincipal":"cluster.local/ns/istio-control/sa/default","sourceWorkload":"ingressgateway","url":"/productpage","userAgent":"curl/7.54.0","xForwardedFor":"10.128.0.35"}
|
||||
{{< text plain >}}
|
||||
[2019-03-06T09:31:27.360Z] "GET /status/418 HTTP/1.1" 418 - "-" 0 135 5 2 "-" "curl/7.60.0" "d209e46f-9ed5-9b61-bbdd-43e22662702a" "httpbin:8000" "127.0.0.1:80" inbound|8000|http|httpbin.default.svc.cluster.local - 172.30.146.73:80 172.30.146.82:38618 outbound_.8000_._.httpbin.default.svc.cluster.local
|
||||
{{< /text >}}
|
||||
|
|
Loading…
Reference in New Issue