-
Notifications
You must be signed in to change notification settings - Fork 5.6k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Add Azure Monitor output plugin (#4089)
- Loading branch information
1 parent
a471497
commit f70d651
Showing
12 changed files
with
1,318 additions
and
88 deletions.
There are no files selected for viewing
Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,139 @@ | ||
# Azure Monitor | ||
|
||
This plugin will send custom metrics to Azure Monitor. Azure Monitor has a | ||
metric resolution of one minute. To handle this in Telegraf, the Azure Monitor | ||
output plugin will automatically aggregates metrics into one minute buckets, | ||
which are then sent to Azure Monitor on every flush interval. | ||
|
||
The metrics from each input plugin will be written to a separate Azure Monitor | ||
namespace, prefixed with `Telegraf/` by default. The field name for each | ||
metric is written as the Azure Monitor metric name. All field values are | ||
written as a summarized set that includes: min, max, sum, count. Tags are | ||
written as a dimension on each Azure Monitor metric. | ||
|
||
Since Azure Monitor only accepts numeric values, string-typed fields are | ||
dropped by default. There is a configuration option (`strings_as_dimensions`) | ||
to retain fields that contain strings as extra dimensions. Azure Monitor | ||
allows a maximum of 10 dimensions per metric so any dimensions over that | ||
amount will be deterministically dropped. | ||
|
||
### Configuration: | ||
|
||
```toml | ||
[[outputs.azure_monitor]] | ||
## Timeout for HTTP writes. | ||
# timeout = "20s" | ||
|
||
## Set the namespace prefix, defaults to "Telegraf/<input-name>". | ||
# namespace_prefix = "Telegraf/" | ||
|
||
## Azure Monitor doesn't have a string value type, so convert string | ||
## fields to dimensions (a.k.a. tags) if enabled. Azure Monitor allows | ||
## a maximum of 10 dimensions so Telegraf will only send the first 10 | ||
## alphanumeric dimensions. | ||
# strings_as_dimensions = false | ||
|
||
## Both region and resource_id must be set or be available via the | ||
## Instance Metadata service on Azure Virtual Machines. | ||
# | ||
## Azure Region to publish metrics against. | ||
## ex: region = "southcentralus" | ||
# region = "" | ||
# | ||
## The Azure Resource ID against which metric will be logged, e.g. | ||
## ex: resource_id = "/subscriptions/<subscription_id>/resourceGroups/<resource_group>/providers/Microsoft.Compute/virtualMachines/<vm_name>" | ||
# resource_id = "" | ||
``` | ||
|
||
### Setup | ||
|
||
1. [Register the `microsoft.insights` resource provider in your Azure subscription][resource provider]. | ||
2. If using Managed Service Identities to authenticate an Azure VM, | ||
[enable system-assigned managed identity][enable msi]. | ||
2. Use a region that supports Azure Monitor Custom Metrics, | ||
For regions with Custom Metrics support, an endpoint will be available with | ||
the format `https://<region>.monitoring.azure.com`. The following regions | ||
are currently known to be supported: | ||
- East US (eastus) | ||
- West US 2 (westus2) | ||
- South Central US (southcentralus) | ||
- West Central US (westcentralus) | ||
- North Europe (northeurope) | ||
- West Europe (westeurope) | ||
- Southeast Asia (southeastasia) | ||
|
||
[resource provider]: https://docs.microsoft.com/en-us/azure/azure-resource-manager/resource-manager-supported-services | ||
[enable msi]: https://docs.microsoft.com/en-us/azure/active-directory/managed-service-identity/qs-configure-portal-windows-vm | ||
|
||
### Region and Resource ID | ||
|
||
The plugin will attempt to discover the region and resource ID using the Azure | ||
VM Instance Metadata service. If Telegraf is not running on a virtual machine | ||
or the VM Instance Metadata service is not available, the following variables | ||
are required for the output to function. | ||
|
||
* region | ||
* resource_id | ||
|
||
### Authentication | ||
|
||
This plugin uses one of several different types of authenticate methods. The | ||
preferred authentication methods are different from the *order* in which each | ||
authentication is checked. Here are the preferred authentication methods: | ||
|
||
1. Managed Service Identity (MSI) token | ||
- This is the prefered authentication method. Telegraf will automatically | ||
authenticate using this method when running on Azure VMs. | ||
2. AAD Application Tokens (Service Principals) | ||
- Primarily useful if Telegraf is writing metrics for other resources. | ||
[More information][principal]. | ||
- A Service Principal or User Principal needs to be assigned the `Monitoring | ||
Contributor` roles. | ||
3. AAD User Tokens (User Principals) | ||
- Allows Telegraf to authenticate like a user. It is best to use this method | ||
for development. | ||
|
||
[principal]: https://docs.microsoft.com/en-us/azure/active-directory/develop/active-directory-application-objects | ||
|
||
The plugin will authenticate using the first available of the | ||
following configurations: | ||
|
||
1. **Client Credentials**: Azure AD Application ID and Secret. | ||
|
||
Set the following Telegraf configuration variables: | ||
|
||
- `azure_tenant_id`: Specifies the Tenant to which to authenticate. | ||
- `azure_client_id`: Specifies the app client ID to use. | ||
- `azure_client_secret`: Specifies the app secret to use. | ||
|
||
Or set the following environment variables: | ||
|
||
- `AZURE_TENANT_ID`: Specifies the Tenant to which to authenticate. | ||
- `AZURE_CLIENT_ID`: Specifies the app client ID to use. | ||
- `AZURE_CLIENT_SECRET`: Specifies the app secret to use. | ||
|
||
2. **Client Certificate**: Azure AD Application ID and X.509 Certificate. | ||
|
||
- `AZURE_TENANT_ID`: Specifies the Tenant to which to authenticate. | ||
- `AZURE_CLIENT_ID`: Specifies the app client ID to use. | ||
- `AZURE_CERTIFICATE_PATH`: Specifies the certificate Path to use. | ||
- `AZURE_CERTIFICATE_PASSWORD`: Specifies the certificate password to use. | ||
|
||
3. **Resource Owner Password**: Azure AD User and Password. This grant type is | ||
*not recommended*, use device login instead if you need interactive login. | ||
|
||
- `AZURE_TENANT_ID`: Specifies the Tenant to which to authenticate. | ||
- `AZURE_CLIENT_ID`: Specifies the app client ID to use. | ||
- `AZURE_USERNAME`: Specifies the username to use. | ||
- `AZURE_PASSWORD`: Specifies the password to use. | ||
|
||
4. **Azure Managed Service Identity**: Delegate credential management to the | ||
platform. Requires that code is running in Azure, e.g. on a VM. All | ||
configuration is handled by Azure. See [Azure Managed Service Identity][msi] | ||
for more details. Only available when using the [Azure Resource Manager][arm]. | ||
|
||
[msi]: https://docs.microsoft.com/en-us/azure/active-directory/msi-overview | ||
[arm]: https://docs.microsoft.com/en-us/azure/azure-resource-manager/resource-group-overview | ||
|
||
**Note: As shown above, the last option (#4) is the preferred way to | ||
authenticate when running Telegraf on Azure VMs. |
Oops, something went wrong.