LXD provides metrics for all running instances. Those covers CPU, memory, network, disk and process usage and are meant to be consumed by Prometheus and likely graphed in Grafana.
In cluster environments, LXD will only return the values for instances running on the server being accessed. It’s expected that each cluster member will be scraped separately.
The instance metrics are updated when calling the
They are cached for 8s to handle multiple scrapers. Fetching metrics is a relatively expensive operation for LXD to perform so consider scraping at a higher than default interval
if the impact is too high.
Create metrics certificate#
/1.0/metrics endpoint is a special one as it also accepts a
metrics type certificate.
This kind of certificate is meant for metrics only, and won’t work for interaction with instances or any other LXD objects.
Here’s how to create a new certificate (this is not specific to metrics):
openssl req -x509 -newkey ec -pkeyopt ec_paramgen_curve:secp384r1 -sha384 -keyout metrics.key -nodes -out metrics.crt -days 3650 -subj "/CN=metrics.local"
Note: OpenSSL version 1.1.0+ is required for the above command to generate a proper certificate.
Now, this certificate needs to be added to the list of trusted clients:
lxc config trust add metrics.crt --type=metrics
Add target to Prometheus#
In order for Prometheus to scrape from LXD, it has to be added to the targets.
First, one needs to ensure that
core.https_address is set so LXD can be reached over the network.
This can be done by running:
lxc config set core.https_address ":8443"
Alternatively, one can use
core.metrics_address which is intended for metrics only.
Second, the newly created certificate and key, as well as the LXD server certificate need to be accessible to Prometheus.
For this, these three files can be copied to
# Create new tls directory mkdir /etc/prometheus/tls # Copy newly created certificate and key to tls directory cp metrics.crt metrics.key /etc/prometheus/tls # Copy LXD server certificate to tls directory cp /var/snap/lxd/common/lxd/server.crt /etc/prometheus/tls # Make sure Prometheus can read these files (usually, Prometheus is run as user "prometheus") chown -R prometheus:prometheus /etc/prometheus/tls
Lastly, LXD has to be added as target.
/etc/prometheus/prometheus.yaml needs to be edited.
Here’s what the config needs to look like:
scrape_configs: - job_name: lxd metrics_path: '/1.0/metrics' scheme: 'https' static_configs: - targets: ['foo.example.com:8443'] tls_config: ca_file: 'tls/server.crt' cert_file: 'tls/metrics.crt' key_file: 'tls/metrics.key' # XXX: server_name is required if the target name # is not covered by the certificate (not in the SAN list) server_name: 'foo'
In the above example,
/etc/prometheus/tls/server.crt looks like:
$ openssl x509 -noout -text -in /etc/prometheus/tls/server.crt ... X509v3 Subject Alternative Name: DNS:foo, IP Address:127.0.0.1, IP Address:0:0:0:0:0:0:0:1 ...
Since the Subject Alternative Name (SAN) list doesn’t include the hostname provided in the
targets list, it is required to override the name used for comparison using the