Audit Vault Metrics
Configuring Vault Metrics for Integration with Ascent
Ingest Vault Metrics Configuration with OpenTelemetry (Otel) and Apica Ascent
This document outlines the steps to configure an OpenTelemetry (Otel) Collector to scrape Vault metrics and ingest them into Apica Ascent.
Prerequisites
Ensure the following are available:
Kubernetes cluster
Vault installed in the cluster
OpenTelemetry Helm chart repository added
Apica Ascent credentials (URL and token)
Steps
Create new OpenTelemetry Collector configuration as a DaemonSet.
Step 1: Add Helm Repositories
Step 2: Create Namespace for OpenTelemetry
Step 3: Apply Service Account and RBAC
Step 4: Install OpenTelemetry Operator
Step 5: Update Configuration Values in 2-apica-otel-config.yaml
Before creating the ConfigMap, update the following values:
APICA_URL: Host URL of the Ascent to ingest the metricsAPICA_TOKEN: Replace with the ingest token of Ascent (Settings > Account > Copy Ingest Token)RUNTIME: Add the runtime identifierCUSTOMER: Add the customer identifier
Apply the updated configuration:
Step 6: Deploy OpenTelemetry Collector as DaemonSet
Step 7: Verify Vault Metrics
Check the logs to ensure Vault metrics are being scraped:
Steps to update the existing OpenTelemetry Collector configuration.
Edit the OpenTelemetryCollector resource:
Add New Receiver for Vault Metrics
Add Exporter for Metrics
Add processors
Update Service Pipeline
If a metrics pipeline already exists, update the exporters, processors, and receivers as needed:
Notes
Replace placeholders (
${APICA_URL},${APICA_TOKEN},${RUNTIME},${CUSTOMER}) with actual values before applying the configurations.Ensure the Vault service endpoint is reachable at
vault.vault.svc.cluster.local:8200.Use the logs to verify the scraping process and troubleshoot if necessary.
Last updated
Was this helpful?
