mirror of
https://github.com/prometheus/node_exporter.git
synced 2025-08-20 18:33:52 -07:00
While the CPU vulnerabilities collector has been added in https://github.com/prometheus/node_exporter/pull/2721 , it's currently not including information regarding the mitigation strategy used for a given vulnerability. This information can be quite valuable, as often times different mitigation strategies come with a different performance impact. This commit adds a third label to the cpu_vulnerabilities_info metric, to include the "mitigation" used for a given vulnerability - if a given vulnerability is not affecting a node or the node is still vulnerable, the mitigation is expected to be empty. Signed-off-by: João Lima <jlima@cloudflare.com> |
||
|---|---|---|
| .. | ||
| ethtool | ||
| proc | ||
| qdisc | ||
| textfile | ||
| usr/lib | ||
| wifi | ||
| e2e-64k-page-output.txt | ||
| e2e-output.txt | ||
| ip_vs_result.txt | ||
| ip_vs_result_lbs_local_address_local_port.txt | ||
| ip_vs_result_lbs_local_port.txt | ||
| ip_vs_result_lbs_none.txt | ||
| sys.ttar | ||
| udev.ttar | ||