f70d6519e7 | ||
---|---|---|
.. | ||
README.md | ||
azure_monitor.go | ||
azure_monitor_test.go |
README.md
Azure Monitor
This plugin will send custom metrics to Azure Monitor. Azure Monitor has a metric resolution of one minute. To handle this in Telegraf, the Azure Monitor output plugin will automatically aggregates metrics into one minute buckets, which are then sent to Azure Monitor on every flush interval.
The metrics from each input plugin will be written to a separate Azure Monitor
namespace, prefixed with Telegraf/
by default. The field name for each
metric is written as the Azure Monitor metric name. All field values are
written as a summarized set that includes: min, max, sum, count. Tags are
written as a dimension on each Azure Monitor metric.
Since Azure Monitor only accepts numeric values, string-typed fields are
dropped by default. There is a configuration option (strings_as_dimensions
)
to retain fields that contain strings as extra dimensions. Azure Monitor
allows a maximum of 10 dimensions per metric so any dimensions over that
amount will be deterministically dropped.
Configuration:
[[outputs.azure_monitor]]
## Timeout for HTTP writes.
# timeout = "20s"
## Set the namespace prefix, defaults to "Telegraf/<input-name>".
# namespace_prefix = "Telegraf/"
## Azure Monitor doesn't have a string value type, so convert string
## fields to dimensions (a.k.a. tags) if enabled. Azure Monitor allows
## a maximum of 10 dimensions so Telegraf will only send the first 10
## alphanumeric dimensions.
# strings_as_dimensions = false
## Both region and resource_id must be set or be available via the
## Instance Metadata service on Azure Virtual Machines.
#
## Azure Region to publish metrics against.
## ex: region = "southcentralus"
# region = ""
#
## The Azure Resource ID against which metric will be logged, e.g.
## ex: resource_id = "/subscriptions/<subscription_id>/resourceGroups/<resource_group>/providers/Microsoft.Compute/virtualMachines/<vm_name>"
# resource_id = ""
Setup
- Register the
microsoft.insights
resource provider in your Azure subscription. - If using Managed Service Identities to authenticate an Azure VM, enable system-assigned managed identity.
- Use a region that supports Azure Monitor Custom Metrics,
For regions with Custom Metrics support, an endpoint will be available with
the format
https://<region>.monitoring.azure.com
. The following regions are currently known to be supported:- East US (eastus)
- West US 2 (westus2)
- South Central US (southcentralus)
- West Central US (westcentralus)
- North Europe (northeurope)
- West Europe (westeurope)
- Southeast Asia (southeastasia)
Region and Resource ID
The plugin will attempt to discover the region and resource ID using the Azure VM Instance Metadata service. If Telegraf is not running on a virtual machine or the VM Instance Metadata service is not available, the following variables are required for the output to function.
- region
- resource_id
Authentication
This plugin uses one of several different types of authenticate methods. The preferred authentication methods are different from the order in which each authentication is checked. Here are the preferred authentication methods:
- Managed Service Identity (MSI) token
- This is the prefered authentication method. Telegraf will automatically authenticate using this method when running on Azure VMs.
- AAD Application Tokens (Service Principals)
- Primarily useful if Telegraf is writing metrics for other resources. More information.
- A Service Principal or User Principal needs to be assigned the
Monitoring Contributor
roles.
- AAD User Tokens (User Principals)
- Allows Telegraf to authenticate like a user. It is best to use this method for development.
The plugin will authenticate using the first available of the following configurations:
-
Client Credentials: Azure AD Application ID and Secret.
Set the following Telegraf configuration variables:
azure_tenant_id
: Specifies the Tenant to which to authenticate.azure_client_id
: Specifies the app client ID to use.azure_client_secret
: Specifies the app secret to use.
Or set the following environment variables:
AZURE_TENANT_ID
: Specifies the Tenant to which to authenticate.AZURE_CLIENT_ID
: Specifies the app client ID to use.AZURE_CLIENT_SECRET
: Specifies the app secret to use.
-
Client Certificate: Azure AD Application ID and X.509 Certificate.
AZURE_TENANT_ID
: Specifies the Tenant to which to authenticate.AZURE_CLIENT_ID
: Specifies the app client ID to use.AZURE_CERTIFICATE_PATH
: Specifies the certificate Path to use.AZURE_CERTIFICATE_PASSWORD
: Specifies the certificate password to use.
-
Resource Owner Password: Azure AD User and Password. This grant type is not recommended, use device login instead if you need interactive login.
AZURE_TENANT_ID
: Specifies the Tenant to which to authenticate.AZURE_CLIENT_ID
: Specifies the app client ID to use.AZURE_USERNAME
: Specifies the username to use.AZURE_PASSWORD
: Specifies the password to use.
-
Azure Managed Service Identity: Delegate credential management to the platform. Requires that code is running in Azure, e.g. on a VM. All configuration is handled by Azure. See Azure Managed Service Identity for more details. Only available when using the Azure Resource Manager.
**Note: As shown above, the last option (#4) is the preferred way to authenticate when running Telegraf on Azure VMs.