F5 BIG-IP integration for Grafana Cloud
F5 BIG-IP is a multifaceted application delivery controller (ADC) that offers load balancing, traffic management, security, and performance optimization for business-critical applications. Deployed as hardware, virtual, or cloud instances, it provides essential scalability and resilience, ensuring uninterrupted and secure access to applications across diverse environments. This integration for Grafana cloud allows users to monitor a BIG-IP cluster with 5 separate dashboards for visualizing metrics and logs for a BIG-IP cluster, node, pool, virtual server, and logs overview dashboards.
This integration supports BIG-IP version 16.1.2+
This integration includes 4 useful alerts and 5 pre-built dashboards to help monitor and visualize F5 BIG-IP metrics.
Before you begin
In order for the integration to properly work, you must set up the F5 BIG-IP exporter and Promtail to collect metrics and logs from F5 BIG-IP. It is recommended to have a separate host where the BIG-IP exporter and Promtail exists away from F5 BIG-IP to be fault-tolerant.
Installing BIG-IP prometheus exporter
The BIG-IP exporter is used to collect metrics and should be hosted on a separate system with Promtail. Once the exporter is installed, config parameters are supplied and then the exporter can be started. To start the service, add BIG-IP flags such as:
./bigip_exporter --bigip.host <bigip-host> --bigip.port <bigip-port> --bigip.username <bigip-username> --bigip.password <bigip-password>
To validate that the BIG-IP Exporter is setup correctly, the Prometheus metrics should be available locally via curl:
curl http://localhost:9142/metrics
Collecting BIG-IP logs
The Logs Overview dashboard actively tracks server, high-availability and audit logs through both a logs volume and raw logs panel. To successfully collect BIG-IP logs, you’ll need to complete several key steps: enable logs on the F5 BIG-IP system, forward these logs using a syslog-forward-converter, and finally, route them to Loki via Promtail.
Enabling logs
Start by enabling logs on your F5 BIG-IP system. These logs must first be enabled on the BIG-IP system which may include auth, authpriv, daemon, local0 and local6 files as recommended in the Mixin for the BIP-IP Log Overview. The logs dashboard can be used to select a syslog_facility which are created when enabling different log sources in BIG-IP. Additional logs can be enabled depending on the user’s need.
Forwarding logs from F5 BIG-IP to a separate host
After logs are enabled, the next step is to securely forward logs to a separate host where Promtail exists. Using a separate host provides an extra layer of security by reducing direct access to the F5 BIG-IP system. This can be done directly in the F5 BIG-IP UI by following these steps:
In Configuration: Navigate to System > Log > Remote Logging on the F5 BIG-IP interface. Then enter the IP address of the separate host to forward logs to.
Processing logs with Rsyslog
Unfortunately, Promtail only accepts syslog messages in RFC 5424 format, therefore you must first use Rsyslog as an intermediate log converter. Rsyslog can be installed on a separate host that Promtail and the BIG-IP exporter are on. Below are the steps to get Rsyslog running:
- Install Rsyslog: If not already installed, get it from the package manager of your choice.
- Configure Rsyslog: Edit
/etc/rsyslog.conf
or create a new configuration file in/etc/rsyslog.d/
. Add the following:
module(load="imudp")
module(load="imtcp")
input(type="imudp" port="50514")
input(type="imtcp" port="50514")
*.* action(type="omfwd"
protocol="tcp" target="127.0.0.1" port="40514"
Template="RSYSLOG_SyslogProtocol23Format"
TCP_Framing="octet-counted" KeepAlive="on"
action.resumeRetryCount="-1"
queue.type="linkedlist" queue.size="50000")
- Restart Rsyslog: Apply the new settings with the following command:
sudo systemctl restart rsyslog
- Verify Operation: Check
/var/log/syslog
for any Rsyslog errors.
Forwarding logs to Loki using Promtail
Finally, after installing Promtail with your method of choice, you will need to create a YAML configuration file. This file serves to integrate Rsyslog, Promtail, and Loki, allowing them to work cohesively. For an example and further explanation on how these components interact, refer to this guide. The resulting YAML configuration should look similar to the one below:
server:
http_listen_port: 9080
grpc_listen_port: 0
positions:
filename: /tmp/positions.yaml
clients:
- url: https://<user>:<pass>@logs-prod3.grafana.net/loki/api/v1/push
scrape_configs:
- job_name: syslog
syslog:
listen_address: 0.0.0.0:40514
idle_timeout: 12h
listen_protocol: "udp"
labels:
job: "syslog"
relabel_configs:
- source_labels: ['__syslog_message_hostname']
target_label: host
- source_labels: ['__syslog_message_severity']
target_label: level
- source_labels: ['__syslog_message_facility']
target_label: syslog_facility
- source_labels: ['__syslog_message_app_name']
target_label: syslog_identifier
Note, this is a separate Promtail YAML config, not the Alloy config where the metric scrapes are defined.
The clients credentials in the Promtail config must be updated with the correct credentials https://<user>:<pass>@logs-prod3.grafana.net/loki/api/v1/push
. Depending on how Promtail was installed, Promtail will use the YAML configuration.
Install F5 BIG-IP integration for Grafana Cloud
- In your Grafana Cloud stack, click Connections in the left-hand menu.
- Find F5 BIG-IP and click its tile to open the integration.
- Review the prerequisites in the Configuration Details tab and set up Grafana Agent to send F5 BIG-IP metrics to your Grafana Cloud instance.
- Click Install to add this integration’s pre-built dashboards and alerts to your Grafana Cloud instance, and you can start monitoring your F5 BIG-IP setup.
Configuration snippets for Grafana Alloy
Advanced mode
The following snippets provide examples to guide you through the configuration process.
To instruct Grafana Alloy to scrape your F5 BIG-IP instances, manually copy and append the snippets to your alloy configuration file, then follow subsequent instructions.
Advanced metrics snippets
prometheus.scrape "metrics_integrations_integrations_f5_bigip" {
targets = [{
__address__ = "<your-node-hostname>:9142",
}]
forward_to = [prometheus.remote_write.metrics_service.receiver]
job_name = "integrations/f5-bigip"
}
To monitor your F5 BIG-IP instance, you must use a discovery.relabel component to discover your F5 BIG-IP Prometheus endpoint and apply appropriate labels, followed by a prometheus.scrape component to scrape it.
Configure the following properties within each discovery.relabel
component:
__address__
: The address to your F5 BIG-IP Prometheus metrics endpoint.instance
label:constants.hostname
sets theinstance
label to your Grafana Alloy server hostname. If that is not suitable, change it to a value uniquely identifies this F5 BIG-IP instance.
If you have multiple F5 BIG-IP servers to scrape, configure one discovery.relabel
for each and scrape them by including each under targets
within the prometheus.scrape
component.
Grafana Agent static configuration (deprecated)
The following section shows configuration for running Grafana Agent in static mode which is deprecated. You should use Grafana Alloy for all new deployments.
Before you begin
In order for the integration to properly work, you must set up the F5 BIG-IP exporter and Promtail to collect metrics and logs from F5 BIG-IP. It is recommended to have a separate host where the BIG-IP exporter and Promtail exists away from F5 BIG-IP to be fault-tolerant.
Installing BIG-IP prometheus exporter
The BIG-IP exporter is used to collect metrics and should be hosted on a separate system with Promtail. Once the exporter is installed, config parameters are supplied and then the exporter can be started. To start the service, add BIG-IP flags such as:
./bigip_exporter --bigip.host <bigip-host> --bigip.port <bigip-port> --bigip.username <bigip-username> --bigip.password <bigip-password>
To validate that the BIG-IP Exporter is setup correctly, the Prometheus metrics should be available locally via curl:
curl http://localhost:9142/metrics
Collecting BIG-IP logs
The Logs Overview dashboard actively tracks server, high-availability and audit logs through both a logs volume and raw logs panel. To successfully collect BIG-IP logs, you’ll need to complete several key steps: enable logs on the F5 BIG-IP system, forward these logs using a syslog-forward-converter, and finally, route them to Loki via Promtail.
Enabling logs
Start by enabling logs on your F5 BIG-IP system. These logs must first be enabled on the BIG-IP system which may include auth, authpriv, daemon, local0 and local6 files as recommended in the Mixin for the BIP-IP Log Overview. The logs dashboard can be used to select a syslog_facility which are created when enabling different log sources in BIG-IP. Additional logs can be enabled depending on the user’s need.
Forwarding logs from F5 BIG-IP to a separate host
After logs are enabled, the next step is to securely forward logs to a separate host where Promtail exists. Using a separate host provides an extra layer of security by reducing direct access to the F5 BIG-IP system. This can be done directly in the F5 BIG-IP UI by following these steps:
In Configuration: Navigate to System > Log > Remote Logging on the F5 BIG-IP interface. Then enter the IP address of the separate host to forward logs to.
Processing logs with Rsyslog
Unfortunately, Promtail only accepts syslog messages in RFC 5424 format, therefore you must first use Rsyslog as an intermediate log converter. Rsyslog can be installed on a separate host that Promtail and the BIG-IP exporter are on. Below are the steps to get Rsyslog running:
- Install Rsyslog: If not already installed, get it from the package manager of your choice.
- Configure Rsyslog: Edit
/etc/rsyslog.conf
or create a new configuration file in/etc/rsyslog.d/
. Add the following:
module(load="imudp")
module(load="imtcp")
input(type="imudp" port="50514")
input(type="imtcp" port="50514")
*.* action(type="omfwd"
protocol="tcp" target="127.0.0.1" port="40514"
Template="RSYSLOG_SyslogProtocol23Format"
TCP_Framing="octet-counted" KeepAlive="on"
action.resumeRetryCount="-1"
queue.type="linkedlist" queue.size="50000")
- Restart Rsyslog: Apply the new settings with the following command:
sudo systemctl restart rsyslog
- Verify Operation: Check
/var/log/syslog
for any Rsyslog errors.
Forwarding logs to Loki using Promtail
Finally, after installing Promtail with your method of choice, you will need to create a YAML configuration file. This file serves to integrate Rsyslog, Promtail, and Loki, allowing them to work cohesively. For an example and further explanation on how these components interact, refer to this guide. The resulting YAML configuration should look similar to the one below:
server:
http_listen_port: 9080
grpc_listen_port: 0
positions:
filename: /tmp/positions.yaml
clients:
- url: https://<user>:<pass>@logs-prod3.grafana.net/loki/api/v1/push
scrape_configs:
- job_name: syslog
syslog:
listen_address: 0.0.0.0:40514
idle_timeout: 12h
listen_protocol: "udp"
labels:
job: "syslog"
relabel_configs:
- source_labels: ['__syslog_message_hostname']
target_label: host
- source_labels: ['__syslog_message_severity']
target_label: level
- source_labels: ['__syslog_message_facility']
target_label: syslog_facility
- source_labels: ['__syslog_message_app_name']
target_label: syslog_identifier
Note, this is a separate Promtail YAML config, not the grafana-agent.yaml
config where the metric scrapes are defined.
The clients credentials in the Promtail config must be updated with the correct credentials https://<user>:<pass>@logs-prod3.grafana.net/loki/api/v1/push
. Depending on how Promtail was installed, Promtail will use the YAML configuration.
Install F5 BIG-IP integration for Grafana Cloud
- In your Grafana Cloud stack, click Connections in the left-hand menu.
- Find F5 BIG-IP and click its tile to open the integration.
- Review the prerequisites in the Configuration Details tab and set up Grafana Agent to send F5 BIG-IP metrics to your Grafana Cloud instance.
- Click Install to add this integration’s pre-built dashboards and alerts to your Grafana Cloud instance, and you can start monitoring your F5 BIG-IP setup.
Post-install configuration for the F5 BIG-IP integration
After enabling the metrics generation, instruct the Grafana Agent to scrape your BIG-IP component. The Grafana Agent config is stored in /etc/grafana-agent.yaml
.
Enable the integration by adding the suggested snippets to your agent configuration file.
In F5 BIG-IP, the job
must be set to integrations/f5-bigip
Make sure to change targets
in the snippet according to your environment. The default port for F5 BIG-IP targets is 9142
.
To receive logs in the integration, you must add the user
and pass
in the clients
url field in the Promtail YAML configuration file.
clients:
- url: https://<user>:<pass>@logs-prod3.grafana.net/loki/api/v1/push
Configuration snippets for Grafana Agent
Below metrics.configs.scrape_configs
, insert the following lines and change the URLs according to your environment:
- job_name: integrations/f5-bigip
metrics_path: /metrics
static_configs:
- targets: ['<your-node-hostname>:9142']
Full example configuration for Grafana Agent
Refer to the following Grafana Agent configuration for a complete example that contains all the snippets used for the F5 BIG-IP integration. This example also includes metrics that are sent to monitor your Grafana Agent instance.
integrations:
prometheus_remote_write:
- basic_auth:
password: <your_prom_pass>
username: <your_prom_user>
url: <your_prom_url>
agent:
enabled: true
relabel_configs:
- action: replace
source_labels:
- agent_hostname
target_label: instance
- action: replace
target_label: job
replacement: "integrations/agent-check"
metric_relabel_configs:
- action: keep
regex: (prometheus_target_sync_length_seconds_sum|prometheus_target_scrapes_.*|prometheus_target_interval.*|prometheus_sd_discovered_targets|agent_build.*|agent_wal_samples_appended_total|process_start_time_seconds)
source_labels:
- __name__
# Add here any snippet that belongs to the `integrations` section.
# For a correct indentation, paste snippets copied from Grafana Cloud at the beginning of the line.
logs:
configs:
- clients:
- basic_auth:
password: <your_loki_pass>
username: <your_loki_user>
url: <your_loki_url>
name: integrations
positions:
filename: /tmp/positions.yaml
scrape_configs:
# Add here any snippet that belongs to the `logs.configs.scrape_configs` section.
# For a correct indentation, paste snippets copied from Grafana Cloud at the beginning of the line.
metrics:
configs:
- name: integrations
remote_write:
- basic_auth:
password: <your_prom_pass>
username: <your_prom_user>
url: <your_prom_url>
scrape_configs:
# Add here any snippet that belongs to the `metrics.configs.scrape_configs` section.
# For a correct indentation, paste snippets copied from Grafana Cloud at the beginning of the line.
- job_name: integrations/f5-bigip
metrics_path: /metrics
static_configs:
- targets: ['<your-node-hostname>:9142']
global:
scrape_interval: 60s
wal_directory: /tmp/grafana-agent-wal
Dashboards
The F5 BIG-IP integration installs the following dashboards in your Grafana Cloud instance to help monitor your system.
- BIG-IP cluster overview
- BIG-IP logs
- BIG-IP node overview
- BIG-IP pool overview
- BIG-IP virtual server overview
F5 BIG-IP cluster overview 1
F5 BIG-IP node overview 1
F5 BIG-IP pool overview 1
Alerts
The F5 BIG-IP integration includes the following useful alerts:
Alert | Description |
---|---|
BigIPLowNodeAvailabilityStatus | Critical: Detecting a significant number of unavailable nodes which can causes potential downtime or degraded performance. |
BigIPServerSideConnectionLimit | Warning: Approaching the connection limit may lead to rejecting new connections, impacting availability. |
BigIPHighRequestRate | Warning: An unexpected spike in requests might indicate an issue like a DDoS attack or unexpected high load. |
BigIPHighConnectionQueueDepth | Warning: A sudden spike or sustained high queue depth may indicate a bottleneck in handling incoming connections. |
Metrics
The most important metrics provided by the F5 BIG-IP integration, which are used on the pre-built dashboards and Prometheus alerts, are as follows:
- bigip_node_cur_sessions
- bigip_node_serverside_bytes_in
- bigip_node_serverside_bytes_out
- bigip_node_serverside_cur_conns
- bigip_node_serverside_max_conns
- bigip_node_serverside_pkts_in
- bigip_node_serverside_pkts_out
- bigip_node_status_availability_state
- bigip_node_tot_requests
- bigip_pool_active_member_cnt
- bigip_pool_connq_depth
- bigip_pool_connq_serviced
- bigip_pool_min_active_members
- bigip_pool_serverside_bytes_in
- bigip_pool_serverside_bytes_out
- bigip_pool_serverside_cur_conns
- bigip_pool_serverside_max_conns
- bigip_pool_serverside_pkts_out
- bigip_pool_status_availability_state
- bigip_pool_tot_requests
- bigip_vs_clientside_bytes_in
- bigip_vs_clientside_bytes_out
- bigip_vs_clientside_cur_conns
- bigip_vs_clientside_evicted_conns
- bigip_vs_clientside_max_conns
- bigip_vs_clientside_pkts_in
- bigip_vs_clientside_pkts_out
- bigip_vs_cs_mean_conn_dur
- bigip_vs_ephemeral_bytes_in
- bigip_vs_ephemeral_bytes_out
- bigip_vs_ephemeral_cur_conns
- bigip_vs_ephemeral_evicted_conns
- bigip_vs_ephemeral_max_conns
- bigip_vs_ephemeral_pkts_in
- bigip_vs_ephemeral_pkts_out
- bigip_vs_status_availability_state
- bigip_vs_tot_requests
- up
Changelog
# 1.0.1 - November 2024
- Update status panel check queries
# 1.0.0 - October 2023
* Initial release
Cost
By connecting your F5 BIG-IP instance to Grafana Cloud, you might incur charges. To view information on the number of active series that your Grafana Cloud account uses for metrics included in each Cloud tier, see Active series and dpm usage and Cloud tier pricing.