You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: ai-management/ai-studio/analytics.mdx
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -29,7 +29,7 @@ The primary point of data collection is the **[Proxy & API Gateway](/ai-manageme
29
29
30
30
1.**Request Details:** Information about the incoming request is captured (e.g., user ID, application ID, requested LLM/route, timestamp).
31
31
2.**LLM Interaction:** Details about the interaction with the backend LLM are recorded (e.g., model used, prompt tokens, completion tokens, latency).
32
-
3.**Cost Calculation:** Using data from the [Model Pricing System](/ai-management/ai-studio/llm-management#model-pricing), the cost of the interaction is calculated based on token counts.
32
+
3.**Cost Calculation:** Using data from the [Model Pricing System](/ai-management/ai-studio/ai-studio#model-pricing), the cost of the interaction is calculated based on token counts.
33
33
4.**Tool Usage:** If the interaction involved [Tools](/ai-management/ai-studio/tools), relevant details might be logged (e.g., which tool was called, success/failure).
34
34
5.**Chat Context:** For interactions originating from the [Chat Interface](/ai-management/ai-studio/chat-interface), metadata about the chat session might be included.
35
35
@@ -89,6 +89,6 @@ Administrators typically access analytics data via dashboards within the Tyk AI
89
89
## Integration with Other Systems
90
90
91
91
***[Budget Control](/ai-management/ai-studio/budgeting):** Analytics data (specifically cost) is likely used by the Budget Control system to track spending against defined limits.
92
-
***[Model Pricing](/ai-management/ai-studio/llm-management#model-pricing):** The pricing definitions are crucial for calculating the cost metric within the analytics system.
92
+
***[Model Pricing](/ai-management/ai-studio/ai-studio#model-pricing):** The pricing definitions are crucial for calculating the cost metric within the analytics system.
93
93
94
94
By providing detailed analytics, Tyk AI Studio enables organizations to effectively manage costs, understand usage patterns, and ensure the optimal performance of their AI interactions.
Copy file name to clipboardExpand all lines: ai-management/ai-studio/budgeting.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -70,7 +70,7 @@ This provides **eventually-accurate** budget control. There may be a slight over
70
70
## Integration with Other Systems
71
71
72
72
***[Analytics & Monitoring](/ai-management/ai-studio/analytics):** The Analytics system provides the cost data used to track spending against budgets. The current spent amount for a budget period is derived from aggregated analytics data.
73
-
***[Model Pricing](/ai-management/ai-studio/llm-management#model-pricing):** The pricing definitions are essential for the Analytics system to calculate costs accurately, which in turn feeds the Budget Control system.
73
+
***[Model Pricing](/ai-management/ai-studio/ai-studio#model-pricing):** The pricing definitions are essential for the Analytics system to calculate costs accurately, which in turn feeds the Budget Control system.
74
74
***[Notification System](/ai-management/ai-studio/notifications):** Budgets trigger notifications when spending reaches defined thresholds. The system supports alerts at **50%**, **80%**, **90%**, and **100%** of the budget limit. Administrators receive notifications when these thresholds are crossed.
**Working Example**: See [`community/plugins/llm-firewall/`](https://github.com/TykTechnologies/ai-studio/tree/main/community/plugins/llm-firewall) for a production-ready content filtering plugin using this pattern.
503
+
**Working Example**: See [`plugins/llm-firewall/`](https://github.com/TykTechnologies/ai-studio-community-plugins/tree/main/plugins/llm-firewall) for a production-ready content filtering plugin using this pattern.
**Description**: Extended caching with semantic similarity matching, cache invalidation policies, and advanced analytics. Extends the community LLM Cache.
@@ -422,7 +418,7 @@ The following examples in `examples/plugins/` demonstrate specific patterns and
Copy file name to clipboardExpand all lines: ai-management/mcps/tyk-docs-mcp.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ sidebarTitle: "Tyk Docs MCP"
7
7
8
8
## Overview
9
9
10
-
*Tyk Docs MCP* is a tool [MCP server](https://github.com/modelcontext/spec) exposing the Tyk documentation to connected AI assistants. It enables the users of AI assistants "talk to" Tyk's documentation. Instead of searching manually, users can ask natural-language questions — and get answers backed by Tyk official docs. The tool makes AI-assisted support, troubleshooting, and documentation exploration fast and reliable.
10
+
*Tyk Docs MCP* is a tool [MCP server](https://modelcontextprotocol.io/introduction) exposing the Tyk documentation to connected AI assistants. It enables the users of AI assistants "talk to" Tyk's documentation. Instead of searching manually, users can ask natural-language questions — and get answers backed by Tyk official docs. The tool makes AI-assisted support, troubleshooting, and documentation exploration fast and reliable.
11
11
12
12
13
13
Here you can see the AI assistant chooses to use Tyk Docs MCP (*Cline* in VS Code) while answering the query *How do I set a rate limit for a Tyk API?*:
Copy file name to clipboardExpand all lines: api-management/authentication/bearer-token.mdx
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -117,7 +117,7 @@ You can use your own identity provider to generate access tokens, then import th
117
117
*Dynamic mTLS* became a standalone authentication method in Tyk 5.12.0 and is now more accurately called [Certificate Authentication](/api-management/authentication/certificate-auth)
118
118
</Note>
119
119
120
-
Prior to Tyk 5.12.0, [Dynamic mTLS](/api-management/implement-tls#configuring-mtls-with-a-dynamic-allow-list) was configured via the Auth Token method by setting the `enableClientCertificate` flag (Tyk Classic: `auth_configs.authToken.use_certificate`).
120
+
Prior to Tyk 5.12.0, [Dynamic mTLS](/api-management/implement-tls#using-a-dynamic-client-certificate-allow-list) was configured via the Auth Token method by setting the `enableClientCertificate` flag (Tyk Classic: `auth_configs.authToken.use_certificate`).
121
121
122
122
```json
123
123
server:
@@ -129,7 +129,7 @@ server:
129
129
enableClientCertificate: true
130
130
```
131
131
132
-
This was later changed to Certificate Authentication, as explained [here](/api-management/implement-tls#dynamc-mtls-problem).
132
+
This was later changed to Certificate Authentication, as explained [here](/api-management/implement-tls#legacy-dynamic-mtls-mode).
Copy file name to clipboardExpand all lines: api-management/authentication/jwt-authorization.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,7 +15,7 @@ sidebarTitle: "Authorization"
15
15
16
16
[JSON Web Tokens (JWT)](https://www.jwt.io/introduction) are a popular method for client authentication and authorization that can be used to secure access to your APIs via Tyk's [JWT Auth](/basic-config-and-security/security/authentication-authorization/json-web-tokens) method.
17
17
18
-
After the JWT signature has been [validated](/basic-config-and-security/security/authentication-authorization/json-web-tokens#signature-validation), Tyk uses the **claims** within the token to determine which security policies (access rights, rate limits and quotas) should be applied to the request.
18
+
After the JWT signature has been [validated](/basic-config-and-security/security/authentication-authorization/json-web-tokens), Tyk uses the **claims** within the token to determine which security policies (access rights, rate limits and quotas) should be applied to the request.
19
19
20
20
From Tyk 5.10, Tyk can perform optional [validation](/api-management/authentication/jwt-claim-validation) of these claims.
Copy file name to clipboardExpand all lines: api-management/authentication/jwt-claim-validation.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -85,7 +85,7 @@ JWT claims can be categorized into two types:
85
85
86
86
### How Tyk Processes JWT Claims
87
87
88
-
After [verifying](/basic-config-and-security/security/authentication-authorization/json-web-tokens#signature-validation) that the token hasn't been tampered with, Tyk processes claims in this order:
88
+
After [verifying](/basic-config-and-security/security/authentication-authorization/json-web-tokens) that the token hasn't been tampered with, Tyk processes claims in this order:
89
89
90
90
1.**Claims Extraction**: All claims from the JWT payload are extracted and stored in [context variables](/api-management/traffic-transformation/request-context-variables) with the format `jwt_claims_CLAIMNAME`. For example, a claim named `role` becomes accessible as `jwt_claims_role`.
0 commit comments