|
3884 | 3884 | "health" |
3885 | 3885 | ], |
3886 | 3886 | "summary": "Readiness Probe Get Method", |
3887 | | - "description": "Handle the readiness probe endpoint, returning service readiness.\n\nIf any provider reports an error status, responds with HTTP 503\nand details of unhealthy providers; otherwise, indicates the\nservice is ready.", |
| 3887 | + "description": "Handle the readiness probe endpoint, returning service readiness.\n\nIf any provider reports an error status, responds with HTTP 503\nand details of unhealthy providers; otherwise, indicates the\nservice is ready.\n\nReturns:\n ReadinessResponse: Object with `ready` indicating overall readiness,\n `reason` explaining the outcome, and `providers` containing the list of\n unhealthy ProviderHealthStatus entries (empty when ready).", |
3888 | 3888 | "operationId": "readiness_probe_get_method_readiness_get", |
3889 | 3889 | "responses": { |
3890 | 3890 | "200": { |
|
4127 | 4127 | "metrics" |
4128 | 4128 | ], |
4129 | 4129 | "summary": "Metrics Endpoint Handler", |
4130 | | - "description": "Handle request to the /metrics endpoint.\n\nProcess GET requests to the /metrics endpoint, returning the\nlatest Prometheus metrics in form of a plain text.\n\nInitializes model metrics on the first request if not already\nset up, then responds with the current metrics snapshot in\nPrometheus format.", |
| 4130 | + "description": "Handle request to the /metrics endpoint.\n\nProcess GET requests to the /metrics endpoint, returning the\nlatest Prometheus metrics in form of a plain text.\n\nInitializes model metrics on the first request if not already\nset up, then responds with the current metrics snapshot in\nPrometheus format.\n\nReturns:\n PlainTextResponse: Response body containing the Prometheus metrics text\n and the Prometheus content type.", |
4131 | 4131 | "operationId": "metrics_endpoint_handler_metrics_get", |
4132 | 4132 | "responses": { |
4133 | 4133 | "200": { |
|
4290 | 4290 | ], |
4291 | 4291 | "summary": "Handle A2A Jsonrpc", |
4292 | 4292 | "description": "Handle A2A JSON-RPC requests following the A2A protocol specification.\n\nThis endpoint uses the DefaultRequestHandler from the A2A SDK to handle\nall JSON-RPC requests including message/send, message/stream, etc.\n\nThe A2A SDK application is created per-request to include authentication\ncontext while still leveraging FastAPI's authorization middleware.\n\nAutomatically detects streaming requests (message/stream JSON-RPC method)\nand returns a StreamingResponse to enable real-time chunk delivery.\n\nArgs:\n request: FastAPI request object\n auth: Authentication tuple\n mcp_headers: MCP headers for context propagation\n\nReturns:\n JSON-RPC response or streaming response", |
4293 | | - "operationId": "handle_a2a_jsonrpc_a2a_post", |
| 4293 | + "operationId": "handle_a2a_jsonrpc_a2a_get", |
4294 | 4294 | "responses": { |
4295 | 4295 | "200": { |
4296 | 4296 | "description": "Successful Response", |
|
4308 | 4308 | ], |
4309 | 4309 | "summary": "Handle A2A Jsonrpc", |
4310 | 4310 | "description": "Handle A2A JSON-RPC requests following the A2A protocol specification.\n\nThis endpoint uses the DefaultRequestHandler from the A2A SDK to handle\nall JSON-RPC requests including message/send, message/stream, etc.\n\nThe A2A SDK application is created per-request to include authentication\ncontext while still leveraging FastAPI's authorization middleware.\n\nAutomatically detects streaming requests (message/stream JSON-RPC method)\nand returns a StreamingResponse to enable real-time chunk delivery.\n\nArgs:\n request: FastAPI request object\n auth: Authentication tuple\n mcp_headers: MCP headers for context propagation\n\nReturns:\n JSON-RPC response or streaming response", |
4311 | | - "operationId": "handle_a2a_jsonrpc_a2a_post", |
| 4311 | + "operationId": "handle_a2a_jsonrpc_a2a_get", |
4312 | 4312 | "responses": { |
4313 | 4313 | "200": { |
4314 | 4314 | "description": "Successful Response", |
|
5538 | 5538 | "type": "null" |
5539 | 5539 | } |
5540 | 5540 | ] |
| 5541 | + }, |
| 5542 | + "splunk": { |
| 5543 | + "anyOf": [ |
| 5544 | + { |
| 5545 | + "$ref": "#/components/schemas/SplunkConfiguration" |
| 5546 | + }, |
| 5547 | + { |
| 5548 | + "type": "null" |
| 5549 | + } |
| 5550 | + ], |
| 5551 | + "title": "Splunk configuration", |
| 5552 | + "description": "Splunk HEC configuration for sending telemetry events." |
| 5553 | + }, |
| 5554 | + "deployment_environment": { |
| 5555 | + "type": "string", |
| 5556 | + "title": "Deployment environment", |
| 5557 | + "description": "Deployment environment name (e.g., 'development', 'staging', 'production'). Used in telemetry events.", |
| 5558 | + "default": "development" |
5541 | 5559 | } |
5542 | 5560 | }, |
5543 | 5561 | "additionalProperties": false, |
|
8824 | 8842 | } |
8825 | 8843 | ] |
8826 | 8844 | }, |
| 8845 | + "SplunkConfiguration": { |
| 8846 | + "properties": { |
| 8847 | + "enabled": { |
| 8848 | + "type": "boolean", |
| 8849 | + "title": "Enabled", |
| 8850 | + "description": "Enable or disable Splunk HEC integration.", |
| 8851 | + "default": false |
| 8852 | + }, |
| 8853 | + "url": { |
| 8854 | + "anyOf": [ |
| 8855 | + { |
| 8856 | + "type": "string" |
| 8857 | + }, |
| 8858 | + { |
| 8859 | + "type": "null" |
| 8860 | + } |
| 8861 | + ], |
| 8862 | + "title": "HEC URL", |
| 8863 | + "description": "Splunk HEC endpoint URL." |
| 8864 | + }, |
| 8865 | + "token_path": { |
| 8866 | + "anyOf": [ |
| 8867 | + { |
| 8868 | + "type": "string", |
| 8869 | + "format": "file-path" |
| 8870 | + }, |
| 8871 | + { |
| 8872 | + "type": "null" |
| 8873 | + } |
| 8874 | + ], |
| 8875 | + "title": "Token path", |
| 8876 | + "description": "Path to file containing the Splunk HEC authentication token." |
| 8877 | + }, |
| 8878 | + "index": { |
| 8879 | + "anyOf": [ |
| 8880 | + { |
| 8881 | + "type": "string" |
| 8882 | + }, |
| 8883 | + { |
| 8884 | + "type": "null" |
| 8885 | + } |
| 8886 | + ], |
| 8887 | + "title": "Index", |
| 8888 | + "description": "Target Splunk index for events." |
| 8889 | + }, |
| 8890 | + "source": { |
| 8891 | + "type": "string", |
| 8892 | + "title": "Source", |
| 8893 | + "description": "Event source identifier.", |
| 8894 | + "default": "lightspeed-stack" |
| 8895 | + }, |
| 8896 | + "timeout": { |
| 8897 | + "type": "integer", |
| 8898 | + "exclusiveMinimum": 0.0, |
| 8899 | + "title": "Timeout", |
| 8900 | + "description": "HTTP timeout in seconds for HEC requests.", |
| 8901 | + "default": 5 |
| 8902 | + }, |
| 8903 | + "verify_ssl": { |
| 8904 | + "type": "boolean", |
| 8905 | + "title": "Verify SSL", |
| 8906 | + "description": "Whether to verify SSL certificates for HEC endpoint.", |
| 8907 | + "default": true |
| 8908 | + } |
| 8909 | + }, |
| 8910 | + "additionalProperties": false, |
| 8911 | + "type": "object", |
| 8912 | + "title": "SplunkConfiguration", |
| 8913 | + "description": "Splunk HEC (HTTP Event Collector) configuration.\n\nSplunk HEC allows sending events directly to Splunk over HTTP/HTTPS.\nThis configuration is used to send telemetry events for inference\nrequests to the corporate Splunk deployment.\n\nUseful resources:\n\n - [Splunk HEC Docs](https://docs.splunk.com/Documentation/SplunkCloud)\n - [About HEC](https://docs.splunk.com/Documentation/Splunk/latest/Data)" |
| 8914 | + }, |
8827 | 8915 | "StatusResponse": { |
8828 | 8916 | "properties": { |
8829 | 8917 | "functionality": { |
|
0 commit comments