LXD collects metrics for all running instances as well as some internal metrics. These metrics cover the CPU, memory, network, disk and process usage. They are meant to be consumed by Prometheus, and you can use Grafana to display the metrics as graphs.
In cluster environments, LXD will only return the values for instances running on the server being accessed. It’s expected that each cluster member will be scraped separately.
The instance metrics are updated when calling the
They are cached for 8s to handle multiple scrapers. Fetching metrics is a relatively expensive operation for LXD to perform so consider scraping at a higher than default interval
if the impact is too high.
Create metrics certificate#
/1.0/metrics endpoint is a special one as it also accepts a
metrics type certificate.
This kind of certificate is meant for metrics only, and won’t work for interaction with instances or any other LXD entities.
Here’s how to create a new certificate (this is not specific to metrics):
openssl req -x509 -newkey ec -pkeyopt ec_paramgen_curve:secp384r1 -sha384 -keyout metrics.key -nodes -out metrics.crt -days 3650 -subj "/CN=metrics.local"
Note: OpenSSL version 1.1.0+ is required for the above command to generate a proper certificate.
Now, this certificate needs to be added to the list of trusted clients:
lxc config trust add metrics.crt --type=metrics
Add target to Prometheus#
In order for Prometheus to scrape from LXD, it has to be added to the targets.
First, one needs to ensure that
core.https_address is set so LXD can be reached over the network.
This can be done by running:
lxc config set core.https_address ":8443"
Alternatively, one can use
core.metrics_address which is intended for metrics only.
Second, the newly created certificate and key, as well as the LXD server certificate need to be accessible to Prometheus.
For this, these three files can be copied to
# Create new tls directory mkdir /etc/prometheus/tls # Copy newly created certificate and key to tls directory cp metrics.crt metrics.key /etc/prometheus/tls # Copy LXD server certificate to tls directory cp /var/snap/lxd/common/lxd/server.crt /etc/prometheus/tls # Make sure Prometheus can read these files (usually, Prometheus is run as user "prometheus") chown -R prometheus:prometheus /etc/prometheus/tls
Lastly, LXD has to be added as target.
/etc/prometheus/prometheus.yaml needs to be edited.
Here’s what the configuration needs to look like:
scrape_configs: - job_name: lxd metrics_path: '/1.0/metrics' scheme: 'https' static_configs: - targets: ['foo.example.com:8443'] tls_config: ca_file: 'tls/server.crt' cert_file: 'tls/metrics.crt' key_file: 'tls/metrics.key' # XXX: server_name is required if the target name # is not covered by the certificate (not in the SAN list) server_name: 'foo'
In the above example,
/etc/prometheus/tls/server.crt looks like:
openssl x509 -noout -text -in /etc/prometheus/tls/server.crt
X509v3 Subject Alternative Name:
DNS:foo, IP Address:127.0.0.1, IP Address:0:0:0:0:0:0:0:1
Since the Subject Alternative Name (SAN) list doesn’t include the host name provided in the
targets list, it is required to override the name used for comparison using the
Here is an example of a
prometheus.yaml configuration where multiple jobs are used to scrape the metrics of multiple LXD servers:
scrape_configs: # abydos, langara and orilla are part of a single cluster (called `hdc` here) # initially bootstrapped by abydos which is why all 3 targets # share the same `ca_file` and `server_name`. That `ca_file` corresponds # to the `/var/snap/lxd/common/lxd/cluster.crt` file found on every member of # the LXD cluster. # # Note: the `project` param is are provided when not using the `default` project # or when multiple projects are used. # # Note: each member of the cluster only provide metrics for instances it runs locally # this is why the `lxd-hdc` cluster lists 3 targets - job_name: "lxd-hdc" metrics_path: '/1.0/metrics' params: project: ['jdoe'] scheme: 'https' static_configs: - targets: - 'abydos.hosts.example.net:8444' - 'langara.hosts.example.net:8444' - 'orilla.hosts.example.net:8444' tls_config: ca_file: 'tls/abydos.crt' cert_file: 'tls/metrics.crt' key_file: 'tls/metrics.key' server_name: 'abydos' # jupiter, mars and saturn are 3 standalone LXD servers. # Note: only the `default` project is used on them, so it is not specified. - job_name: "lxd-jupiter" metrics_path: '/1.0/metrics' scheme: 'https' static_configs: - targets: ['jupiter.example.com:9101'] tls_config: ca_file: 'tls/jupiter.crt' cert_file: 'tls/metrics.crt' key_file: 'tls/metrics.key' server_name: 'jupiter' - job_name: "lxd-mars" metrics_path: '/1.0/metrics' scheme: 'https' static_configs: - targets: ['mars.example.com:9101'] tls_config: ca_file: 'tls/mars.crt' cert_file: 'tls/metrics.crt' key_file: 'tls/metrics.key' server_name: 'mars' - job_name: "lxd-saturn" metrics_path: '/1.0/metrics' scheme: 'https' static_configs: - targets: ['saturn.example.com:9101'] tls_config: ca_file: 'tls/saturn.crt' cert_file: 'tls/metrics.crt' key_file: 'tls/metrics.key' server_name: 'saturn'
Provided instance metrics#
The following instance metrics are provided:
Provided internal metrics#
The following internal metrics are provided: