Supported Metrics

Supported Metrics through Cisco Firepower Threat Defense Enterprise Manager

The following tabs represent the Native Type of Cisco Firepower Threat Defense Backup

Tabbed Interface with Table
Cisco FMC
Cisco FTD Device
Cisco FTD Interfaces
Metric NameMetric LabelUnitsApplication VersionDescription
cisco_ftd_event_Statistics2.0.0Cisco FTD Event Statistics
Metric NameMetric LabelUnitsApplication VersionDescription
cisco_ftd_health_statusAvailability1.0.0Health status of Ftd device
cisco_ftd_mem_freeUsageBytes1.0.0The total free memory.
cisco_ftd_mem_usedUsageBytes1.0.0The total memory available.
cisco_ftd_mem_used_percentage_linaUsage%1.0.0The percent of memory used by the data plane.
cisco_ftd_mem_used_percentage_snortUsage%1.0.0The percent of memory used by the Snort process
cisco_ftd_mem_used_percentage_system_and_swapUsage%1.0.0The percent of memory used by the system and swap combined.
cisco_ftd_cpu_lina_cp_avgUsage%1.0.0The average CPU utilization for the control plane
cisco_ftd_cpu_lina_dp_avgUsage%1.0.0The average CPU utilization for the data plane.
cisco_ftd_cpu_snort_avgUsage%1.0.0The average CPU utilization for the Snort process.
cisco_ftd_cpu_system_avgUsage%1.0.0The average CPU utilization for the system processes.
cisco_ftd_cpu_lina_avgUsage%1.0.0The average CPU utilization for all the cores.
cisco_ftd_packets_bypassed_snort_busyUsagecount1.0.0The number of packets that bypassed inspection when Snort was too busy to handle the packets.
cisco_ftd_packets_bypassed_snort_downUsagecount1.0.0The number of packets that bypassed inspection when Snort was down.
cisco_ftd_packets_drops_rxq_fullUsagecount1.0.0The number of packets bypassed due to a receive queue full.
cisco_ftd_disk_total_usedUsageBytes1.0.0The total space used on the device disk.
cisco_ftd_disk_used_percentageUsage%1.0.0The percent of disk space used by different partitions.
cisco_ftd_critical_process_restart_countAvailabilitycount1.0.0Restart count of each critical processes.
cisco_ftd_critical_process_cpu_utilUsage%1.0.0Cpu utilization of each critical process.
cisco_ftd_critical_process_statusAvailability1.0.0The status of critical processes
cisco_ftd_critical_process_used_memUsageBytes1.0.0The memory used for each critical process
cisco_ftd_critical_process_uptimeAvailabilitys1.0.0The uptime of each critical process.
cisco_ftd_connection_in_useUsagecount1.0.0Shows the number of connections in use
cisco_ftd_connection_most_usedUsagecount1.0.0Shows the maximum number of simultaneous connections.
cisco_ftd_cps_udpUsagecount1.0.0The connections-per-second for UDP connection types.
cisco_ftd_cps_tcpUsagecount1.0.0The connections-per-second for TCP connection types.
Native TypeMetric NameDisplay NameUnitsApplication VersionDefault MetricsDescription
cisco_ftd_interface_drop_packetsUsagecount1.0.0The number of packets dropped.
cisco_ftd_interface_input_bytesUsageBytes1.0.0The total incoming bytes.
cisco_ftd_interface_input_packetsUsagecount1.0.0The total incoming packets.
cisco_ftd_interface_output_bytesUsageBytes1.0.0The total outgoing bytes.
cisco_ftd_interface_output_packetsUsagecount1.0.0The total outgoing packets.

Default Monitoring Configurations

Cisco Firepower Threat Defense has default Global Device Management Policies, Global Templates, Global Monitors and Global Metrics in OpsRamp. You can customize these default monitoring configurations as per your business requirement by cloning respective Global Templates and Global Device Management Policies. It is recommended to clone them before installing the application to avoid noise alerts and data.

  1. Default Global Device Management Policies

    You can find the Device Management Policy for each Native Type at Setup > Resources > Device Management Policies. Search with suggested names in global scope:

    {appName nativeType - version}

    Ex: cisco-firepower-threat-defense Cisco FTD Interfaces - 1 (i.e, appName =cisco-firepower-threat-defense, nativeType = Cisco FTD Interfaces, version = 1)

  2. Default Global Templates

    You can find the Global Templates for each Native Type at Setup > Monitoring > Templates. Search with suggested names in global scope. Each template adheres to the following naming convention:

    {appName nativeType 'Template' - version}

    Ex: cisco-firepower-threat-defense Cisco FTD Interfaces Template - 1 (i.e, appName = cisco-firepower-threat-defense, nativeType = Cisco FTD Interfaces Template, version = 1)

  3. Default Global Monitors

    You can find the Global Monitors for each Native Type at Setup > Monitoring > Monitors. Search with suggested names in global scope. Each Monitors adheres to the following naming convention:

    {monitorKey appName nativeType - version}

    Ex: Cisco FTD Interface Monitor cisco-firepower-threat-defense Cisco FTD Interfaces 1(i.e, monitorKey =Cisco FTD Interface Monitor, appName = cisco-firepower-threat-defense, nativeType = Cisco FTD Interfaces, version = 1)