Skip to main content

Documentation Index

Fetch the complete documentation index at: https://mintlify.com/samkit511/SAW---Security-Analyst-Workspace/llms.txt

Use this file to discover all available pages before exploring further.

GET /metrics-json gives you a live snapshot of the SAW server’s operating state without requiring authentication. Use it to monitor concurrency headroom, verify that feature flags are active, and expose SAW’s limits to an external monitoring stack.

GET /metrics-json

No authentication is required. The response is always served synchronously from in-memory state, so latency is negligible.
curl https://your-saw-host/metrics-json
Example response
{
  "schema_version": "2.0.0",
  "system_name": "Multi-Agent Security Operations Assistant",
  "inflight_requests": 2,
  "limits": {
    "max_inflight": 8,
    "rate_limit_window_seconds": 60,
    "rate_limit_max_requests": 12,
    "max_request_bytes": 16384
  },
  "feature_flags": {
    "adk_advisory": true,
    "escalation": true
  }
}

Response fields

schema_version
string
required
Version of the SAW response schema. Current value is "2.0.0". Increment this when breaking changes are introduced to the response shape.
system_name
string
required
Human-readable system identifier. Always "Multi-Agent Security Operations Assistant".
inflight_requests
number
required
Number of requests currently being processed across all endpoints. When this value equals limits.max_inflight, the next request to /ingest-log, /assistant/request, or /agent-test receives a 503 response.
limits
object
required
Hard limits currently active on the server. All values are read at startup from environment variables and remain constant until the server restarts.
feature_flags
object
required
Runtime feature flag states. Flags are read from environment variables at startup.

Build docs developers (and LLMs) love