docs/content/stable/yugabyte-cloud/cloud-monitor/managed-integrations.md
You can export cluster metrics and logs to third-party tools for analysis and customization.
To export either metrics or logs from a cluster:
Create an export configuration for the integration you want to use. A configuration defines the sign in credentials and settings for the tool that you want to export to.
Using the configuration you created, connect your cluster.
While the connection is active, metrics or logs are automatically streamed to the tool.
Currently, you can export data to the following tools.
| Integration | Log export | Metric export |
|---|---|---|
| Datadog | Database query logs | |
| Database audit logs | Yes | |
| Grafana Cloud | Yes | |
| Sumo Logic | Yes | |
| Prometheus | Yes | |
| VictoriaMetrics | Yes | |
| Google Cloud Logging | Database audit logs | |
| New Relic | Yes | |
| Amazon S3 | Database query logs | |
| Database audit logs |
Create and manage export configurations on the Integrations page.
The page lists the configured and available third-party integrations.
To view the configured integrations, click the View button for the integration.
To delete a configuration, click View, click the three dots, and choose Delete configuration. You can't delete a configuration that is assigned to a cluster.
Note that you can't modify an existing integration configuration. If you need to change an integration (for example, to replace or update an API key) for a particular tool, do the following:
Exporting cluster metrics and logs counts against your data transfer allowance. This may incur additional costs for network transfer, especially for cross-region and internet-based transfers, if usage exceeds your cluster allowance. Refer to Data transfer costs.
You can add and delete export configurations for the following tools. You can't delete a configuration that is assigned to a cluster.
The Datadog integration requires the following:
To create an export configuration, do the following:
The Grafana Cloud integration requires the following:
To create an export configuration, do the following:
https://grafana.com/orgs/<organization-name>).The Sumo Logic integration requires the following:
To create an export configuration, do the following:
Prometheus integration is only available for clusters deployed on AWS or GCP.
The Prometheus integration requires the following:
Prometheus instance
Deployed in a VPC on AWS or GCP.
VPC hosting the Prometheus instance has the following Inbound Security Group rules:
See Control traffic to your AWS resources using security groups in the AWS documentation, or VPC firewall rules in the Google Cloud documentation.
Endpoint URL that is publicly resolvable and maps to the private IP of the Prometheus instance.
The endpoint URL must have a publicly accessible DNS record so that its hostname can be resolved globally. Typically, this involves adding the URL to a public DNS zone. For example, in AWS, you would add the endpoint URL to a Public Hosted Zone in Route 53.
To verify that the endpoint is publicly resolvable, you can use a tool such as nslookup.
Note that the Prometheus instance itself should not be publicly accessible, but must be reachable from your YugabyteDB Aeon cluster via VPC peering (see YugabyteDB Aeon requirements below).
OTLP Receiver feature flag enabled. {{< note title="Note" >}} How you enable the OTLP Receiver feature flag differs between Prometheus versions. Be sure to check the appropriate documentation for your version of Prometheus. {{< /note >}}
Enable out-of-order ingestion.
Prometheus does not guarantee the order of metrics. To ensure that metrics are ingested in order and prevent out-of-order ingestion errors, you must enable out-of-order ingestion. For more information, see Prometheus out-of-order ingestion.
YugabyteDB Aeon cluster from which you want to export metrics
Cluster deployed in VPCs on AWS, or a VPC in GCP. See VPCs.
VPCs are peered with the VPC hosting Prometheus. See Peer VPCs.
As each region of a cluster deployed in AWS has its own VPC, make sure that all the VPCs are peered and allow inbound access from Prometheus; this also applies to regions you add or change after deployment, and to read replicas. In GCP, clusters are deployed in a single VPC.
For information on VPC networking in YugabyteDB Aeon, see VPC network overview.
To create an export configuration, do the following:
On the Integrations page, click Configure for the Prometheus integration or, if a configuration is already available, Add Configuration.
Enter a name for the configuration.
Enter the endpoint URL of the Prometheus instance.
The URL must be in the form
http://<prometheus-endpoint-host-address>/api/v1/otlp
Click Create Configuration.
VictoriaMetrics integration is only available for clusters deployed on AWS or GCP.
The VictoriaMetrics integration requires the following:
VictoriaMetrics self-hosted instance (Enterprise and Cloud are not currently supported)
Deployed in a VPC on AWS or GCP.
Publically-accessible endpoint URL that resolves to the private IP of the VictoriaMetrics instance.
The DNS for the endpoint must be in a publicly accessible DNS record, allowing it to resolve globally. This typically involves adding the URL to a public DNS zone. To confirm that the address is publicly resolvable, you can use a tool like nslookup.
The URL must be in the form as described in How to use OpenTelemetry metrics with VictoriaMetrics.
VPC hosting the VictoriaMetrics instance has the following Inbound Security Group rules:
See Control traffic to your AWS resources using security groups in the AWS documentation, or VPC firewall rules in the Google Cloud documentation.
YugabyteDB Aeon cluster from which you want to export metrics
As each region of a cluster deployed in AWS has its own VPC, make sure that all the VPCs are peered and allow inbound access from VictoriaMetrics; this also applies to regions you add or change after deployment, and to read replicas. In GCP, clusters are deployed in a single VPC.
For information on VPC networking in YugabyteDB Aeon, see VPC network overview.
To create an export configuration, do the following:
On the Integrations page, click Configure for the VictoriaMetrics integration or, if a configuration is already available, Add Configuration.
Enter a name for the configuration.
Enter the endpoint URL of the VictoriaMetrics instance.
The URL must be in the form
http://<victoria-metrics-endpoint-host-address>/opentelemetry
Click Create Configuration.
The Google Cloud Logging integration requires the following:
logging.logWriter permission.To create an export configuration for Google Cloud Logging, do the following:
The New Relic integration requires the following:
To create an export configuration, do the following:
https://otlp.nr-data.nethttps://otlp.eu01.nr-data.netThe Amazon S3 integration requires the following:
s3:PutObject permission for the S3 bucket. For more information, refer to Managing access keys for IAM users in the AWS documentation.To create an export configuration, do the following:
/; enter / alone to store logs at the root.Note that YugabyteDB Aeon cannot detect errors in configuration. To verify your settings are correct, after creating the configuration, monitor your bucket to ensure logs are being written.
<!--### Dynatrace The [Dynatrace](https://www.dynatrace.com) integration requires the following: - Publically-accessible [OTLP endpoint URL](https://docs.dynatrace.com/docs/ingest-from/opentelemetry/otlp-api#export-to-dynatrace) of your Dynatrace instance. The endpoint URL is the URL of your Dynatrace instance. For example: `https://{your-environment-id}.live.dynatrace.com/api/v2/otlp` Note that if you copy your Dynatrace environment ID from the browser address bar, make sure to remove `.apps`. - [Dynatrace Access Token](https://docs.dynatrace.com/docs/manage/identity-access-management/access-tokens-and-oauth-clients/access-tokens#create-api-token). The access token needs to have ingest metrics, ingest logs, ingest OpenTelemetry traces, and read API tokens [scope](https://docs.dynatrace.com/docs/manage/identity-access-management/access-tokens-and-oauth-clients/access-tokens#scopes). To create an export configuration, do the following: 1. On the **Integrations** page, click **Configure** for the Dynatrace provider or, if a configuration is already available, **Add Configuration**. 1. Enter a name for the configuration. 1. Enter the Dynatrace Endpoint URL. 1. Enter your Dynatrace Access Token. 1. Optionally, click **Download** to download the Dynatrace dashboard template. You can import this template in your Dynatrace account and use it as a starting point for visualizing your cluster data. 1. Click **Test Configuration** to make sure your connection is working. 1. Click **Create Configuration**.-->