Audit Vault Metrics

Configuring Vault Metrics for Integration with Ascent

Configuration files

Ingest Vault Metrics Configuration with OpenTelemetry (Otel) and Apica Ascent

This document outlines the steps to configure an OpenTelemetry (Otel) Collector to scrape Vault metrics and ingest them into Apica Ascent.

Prerequisites

Ensure the following are available:

  • Kubernetes cluster

  • Vault installed in the cluster

  • OpenTelemetry Helm chart repository added

  • Apica Ascent credentials (URL and token)


Steps

Create new OpenTelemetry Collector configuration as a DaemonSet.

Step 1: Add Helm Repositories

Step 2: Create Namespace for OpenTelemetry

Step 3: Apply Service Account and RBAC

Step 4: Install OpenTelemetry Operator

Step 5: Update Configuration Values in 2-apica-otel-config.yaml

Before creating the ConfigMap, update the following values:

  • APICA_URL: Host URL of the Ascent to ingest the metrics

  • APICA_TOKEN: Replace with the ingest token of Ascent (Settings > Account > Copy Ingest Token)

  • RUNTIME: Add the runtime identifier

  • CUSTOMER: Add the customer identifier

Apply the updated configuration:

Step 6: Deploy OpenTelemetry Collector as DaemonSet

Step 7: Verify Vault Metrics

Check the logs to ensure Vault metrics are being scraped:


Steps to update the existing OpenTelemetry Collector configuration.

Edit the OpenTelemetryCollector resource:

Add New Receiver for Vault Metrics

Add Exporter for Metrics

Add processors

Update Service Pipeline

If a metrics pipeline already exists, update the exporters, processors, and receivers as needed:


Notes

  • Replace placeholders (${APICA_URL}, ${APICA_TOKEN}, ${RUNTIME}, ${CUSTOMER}) with actual values before applying the configurations.

  • Ensure the Vault service endpoint is reachable at vault.vault.svc.cluster.local:8200.

  • Use the logs to verify the scraping process and troubleshoot if necessary.

Last updated

Was this helpful?