Chapter 4. Monitoring the Record Encryption filter


This section describes how to monitor the Record Encryption filter.

4.1. Record Encryption filter metrics

The filter emits metrics that provide insights into its interactions with the configured KMS. They indicate the load the filter places on the KMS infrastructure and how often its interactions with the KMS fail.

The filter emits metrics that count the number of records that are being encrypted. This can help you verify that the filter is configured properly and encrypting specific topics as intended.

These metrics are made available automatically once metrics are enabled in the proxy.

4.1.1. KMS metrics

KMS metrics track and count the following types of interactions:

  • Generating DEK pairs
  • Decrypting EDEKs
  • Resolving KEK aliases
Expand
Table 4.1. KMS metrics
Metric NameTypeLabelsDescription

kroxylicious_kms_operation_attempt_total

Counter

operation

Count of the number of KMS operations attempted.

kroxylicious_kms_operation_outcome_total

Counter

operation, outcome

Count of the number of KMS operations grouped by outcome.

Expand
Table 4.2. Labels used on the KMS metrics
LabelDomainDescription

operation

generate_dek_pair, decrypt_edek, resolve_alias

Type of operation performed.

outcome

SUCCESS, EXCEPTION, NOT_FOUND

Result of the operation.

4.1.2. Encryption accounting metrics

Encryption accounting metrics count the number of records sent to topics that are encrypted and the number of records sent to topics that are not configured for encryption. These metrics are discriminated by topic name. Use these metrics to confirm you configuration is having the effect you desired.

Expand
Table 4.3. Encryption accounting metrics
Metric NameTypeLabelsDescription

kroxylicious_filter_record_encryption_encrypted_records

Counter

topic_name

Count of the number of records encrypted by the filter.

kroxylicious_filter_record_encryption_plain_records

Counter

topic_name

Count of the number of records not encrypted by the filter.

Red Hat logoGithubredditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust. Explore our recent updates.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Theme

© 2026 Red Hat
Back to top