Google VPC Metrics via Telegraf
Ship your Google VPC Metrics via Telegraf to your Logit.io Stack
Configure Telegraf to ship Google VPC metrics to your Logit.io stacks via Logstash.
Follow this step by step guide to get 'logs' from your system to Logit.io:
Step 1 - Set credentials in GCP
Google Virtual Private Cloud (VPC) is a networking service provided by Google Cloud that enables organizations to create and manage their own isolated virtual networks in the cloud. VPC allows for secure communication and data transfer between resources within the network and provides control over network configuration and routing.
- Begin by heading over to the 'Project Selector' and select the specific project from which you wish to send metrics.
- Progress to the 'Service Account Details' screen. Here, assign a distinct name to your service account and opt for 'Create and Continue'.
- In the 'Grant This Service Account Access to Project' screen, ensure the following roles: 'Compute Viewer', 'Monitoring Viewer', and 'Cloud Asset Viewer'.
- Upon completion of the above, click 'Done'.
- Now find and select your project in the 'Service Accounts for Project' list.
- Move to the 'KEYS' section.
- Navigate through Keys > Add Key > Create New Key, and specify 'JSON' as the key type.
- Lastly, click on 'Create', and make sure to save your new key.
Now add the environment variable for the key
On the machine run:
export GOOGLE_APPLICATION_CREDENTIALS=<your-gcp-key>
Step 2 - Install Telegraf
This integration allows you to configure a Telegraf agent to send your metrics, in multiple formats, to Logit.io.
Telegraf is a flexible server agent equipped with plug-in support, useful for sending metrics and events from data sources like web servers, APIs, application logs, and cloud services.
To ship your metrics to Logit.io, we will integrate the relevant input and outputs.http plug-in into your Telegraf configuration file.
Choose the install for your operating system below to get started:
Windows
wget https://dl.influxdata.com/telegraf/releases/telegraf-1.19.2_windows_amd64.zip
Download and extract to: C:\Program Files\Logitio\telegraf\
Configuration file: C:\Program Files\Logitio\telegraf\
MacOS
brew install telegraf
Configuration file x86_64 Intel: /usr/local/etc/telegraf.conf
Configuration file ARM (Apple Silicon): /opt/homebrew/etc/telegraf.conf
Ubuntu/Debian
wget -q https://repos.influxdata.com/influxdata-archive_compat.key
echo '393e8779c89ac8d958f81f942f9ad7fb82a25e133faddaf92e15b16e6ac9ce4c influxdata-archive_compat.key' | sha256sum -c && cat influxdata-archive_compat.key | gpg --dearmor | sudo tee /etc/apt/trusted.gpg.d/influxdata-archive_compat.gpg > /dev/null
echo 'deb [signed-by=/etc/apt/trusted.gpg.d/influxdata-archive_compat.gpg] https://repos.influxdata.com/debian stable main' | sudo tee /etc/apt/sources.list.d/influxdata.list
sudo apt-get update
sudo apt-get install telegraf
Configuration file: /etc/telegraf/telegraf.conf
RedHat and CentOS
cat <<EOF | sudo tee /etc/yum.repos.d/influxdata.repo
[influxdata]
name = InfluxData Repository - Stable
baseurl = https://repos.influxdata.com/stable/\$basearch/main
enabled = 1
gpgcheck = 1
gpgkey = https://repos.influxdata.com/influxdata-archive_compat.key
EOF
sudo yum install telegraf
Configuration file: /etc/telegraf/telegraf.conf
SLES & openSUSE
zypper ar -f obs://devel:languages:go/ go
zypper in telegraf
Configuration file: /etc/telegraf/telegraf.conf
FreeBSD/PC-BSD
sudo pkg install telegraf
Configuration file: /etc/telegraf/telegraf.conf
Step 3 - Configure the Telegraf input plugin
First you need to set up the input plug-in to enable Telegraf to scrape the GCP data from your hosts. This can be accomplished by incorporating the following code into your configuration file:
# Gather timeseries from Google Cloud Platform v3 monitoring API
[[inputs.stackdriver]]
## GCP Project
project = "<your-project-name>"
## Include timeseries that start with the given metric type.
metric_type_prefix_include = [
"vpcaccess.googleapis.com",
]
## Most metrics are updated no more than once per minute; it is recommended
## to override the agent level interval with a value of 1m or greater.
interval = "1m"
Step 4 - Configure the output plugin
Once you have generated the configuration file, you need to set up the output plug-in to allow Telegraf to transmit your data to Logit.io in Prometheus format. This can be accomplished by incorporating the following code into your configuration file:
[[outputs.http]]
url = "https://<your-metrics-username>:<your-metrics-password>@<your-metrics-stack-id>-vm.logit.io:0/api/v1/write"
data_format = "prometheusremotewrite"
[outputs.http.headers]
Content-Type = "application/x-protobuf"
Content-Encoding = "snappy"
Step 5 - Start Telegraf
Windows
telegraf.exe --service start
MacOS
telegraf --config telegraf.conf
Linux
sudo service telegraf start
for systemd installations
systemctl start telegraf
Step 6 - View your metrics
Data should now have been sent to your Stack.
If you don't see metrics take a look at How to diagnose no data in Stack below for how to diagnose common issues.
Step 7 - How to diagnose no data in Stack
If you don't see data appearing in your Stack after following the steps, visit the Help Centre guide for steps to diagnose no data appearing in your Stack or Chat to support now.
Step 8 - Telegraf Google VPC Platform metrics Overview
Telegraf, the dynamic open-source server agent by InfluxData, is designed for collecting metrics and data from a variety of sources, including cloud networks. Google VPC provides scalable and secure private networking for VMs, containers, and microservices, allowing users to customize their network topology and manage traffic flow and connectivity in a cloud environment.
By integrating Telegraf with Google VPC, organizations can monitor network performance, utilization, and security metrics in real time. This is crucial for network administrators and cloud architects who need to ensure optimal network performance, enforce security policies, and troubleshoot connectivity issues within their Google Cloud environments. Key metrics that can be monitored include network traffic flow, packet loss, latency, and the status of network security rules, providing insights necessary for maintaining a high-performing and secure cloud network infrastructure.
However, the complexity and volume of data generated by cloud networks like Google VPC can present significant challenges in terms of analysis, management, and visualization. Logit.io addresses these challenges by offering a sophisticated platform that simplifies the processing and analysis of network metrics from Telegraf and Google VPC.
With Logit.io, organizations can enhance their network monitoring and analytics capabilities, enabling them to quickly identify and address performance bottlenecks, optimize network configurations, and ensure compliance with security standards. The platform's comprehensive analytics and visualization tools support a proactive approach to network management, helping users to maintain seamless connectivity and robust security across their Google Cloud infrastructure.
For those leveraging Telegraf in conjunction with Google VPC and looking to advance their network monitoring and analytics, Logit.io provides the essential tools and support needed. Our platform facilitates the effective management of network metrics, allowing you to derive actionable insights and ensure the reliability and security of your cloud networking infrastructure. With the addition of leveraging our Google AI Platform integration, you can also automatically process and categorize logs, ensuring that the right data is sent to Logit.io for analysis. This integration enhances the accuracy and efficiency of log analysis, making it easier to identify and respond to critical events in real-time. Additionally, for a comprehensive approach to cloud security and access control, organizations can tie this data transmission process into Google Identity Access Metrics. By implementing Google Identity Access Metrics alongside Logit.io, you can monitor and assess user access and behavior patterns, strengthening your cloud security posture and ensuring that your log data is protected from unauthorized access. These integrations are perfectly in sync with Logit.io's GCP logging.