---
title: "F5 BIG-IP integration | Grafana Cloud documentation"
description: "Learn about F5 BIG-IP Grafana Cloud integration."
---

> For a curated documentation index, see [llms.txt](/llms.txt). For the complete documentation index, see [llms-full.txt](/llms-full.txt).

# F5 BIG-IP integration for Grafana Cloud

F5 BIG-IP is a multifaceted application delivery controller (ADC) that offers load balancing, traffic management, security, and performance optimization for business-critical applications. Deployed as hardware, virtual, or cloud instances, it provides essential scalability and resilience, ensuring uninterrupted and secure access to applications across diverse environments. This integration for Grafana cloud allows users to monitor a BIG-IP cluster with 5 separate dashboards for visualizing metrics and logs for a BIG-IP cluster, node, pool, virtual server, and logs overview dashboards.

This integration supports BIG-IP version 16.1.2+

This integration includes 4 useful alerts and 5 pre-built dashboards to help monitor and visualize F5 BIG-IP metrics.

## Before you begin

In order for the integration to properly work, you must set up the F5 BIG-IP exporter and Promtail to collect metrics and logs from F5 BIG-IP. It is recommended to have a separate host where the BIG-IP exporter and Promtail exists away from F5 BIG-IP to be fault-tolerant.

#### Installing BIG-IP prometheus exporter

The [BIG-IP exporter](https://github.com/ExpressenAB/bigip_exporter) is used to collect metrics and should be hosted on a separate system with Promtail. Once the exporter is installed, [config parameters](https://github.com/ExpressenAB/bigip_exporter#parameters) are supplied and then the exporter can be started. To start the service, add BIG-IP flags such as:

Bash ![Copy code to clipboard](/media/images/icons/icon-copy-small-2.svg) Copy

```bash
./bigip_exporter --bigip.host <bigip-host> --bigip.port <bigip-port> --bigip.username <bigip-username> --bigip.password <bigip-password>
```

To validate that the BIG-IP Exporter is setup correctly, the Prometheus metrics should be available locally via curl:

sh ![Copy code to clipboard](/media/images/icons/icon-copy-small-2.svg) Copy

```sh
curl http://localhost:9142/metrics
```

### Collecting BIG-IP logs

The Logs Overview dashboard actively tracks server, high-availability and audit logs through both a logs volume and raw logs panel. To successfully collect BIG-IP logs, you’ll need to complete several key steps: enable logs on the F5 BIG-IP system, forward these logs using a [syslog-forward-converter](https://utcc.utoronto.ca/~cks/space/blog/sysadmin/PromtailRsyslogForwarderSetup), and finally, route them to Loki via [Promtail](/docs/loki/latest/setup/install/).

### Enabling logs

Start by enabling logs on your F5 BIG-IP system. These logs must first be [enabled](https://my.f5.com/manage/s/article/K35284961) on the BIG-IP system which may include auth, authpriv, daemon, local0 and local6 files as recommended in the [Mixin for the BIP-IP Log Overview](https://github.com/grafana/jsonnet-libs/tree/14ecb5b5cecc02afe3855b67c3a93fe44f75b5ce/f5-bigip-mixin#enabling-logs-on-f5-big-ip). The logs dashboard can be used to select a syslog\_facility which are created when enabling different [log sources](https://clouddocs.f5.com/api/icontrol-soap/Log__Filter__Source.html) in BIG-IP. Additional logs can be enabled depending on the user’s need.

### Forwarding logs from F5 BIG-IP to a separate host

After logs are enabled, the next step is to securely forward logs to a separate host where Promtail exists. Using a separate host provides an extra layer of security by reducing direct access to the F5 BIG-IP system. This can be done directly in the F5 BIG-IP UI by following these steps:

In Configuration: Navigate to System &gt; Log &gt; Remote Logging on the F5 BIG-IP interface. Then enter the IP address of the separate host to forward logs to.

### Processing logs with Rsyslog

Unfortunately, Promtail only accepts syslog messages in [RFC 5424 format](https://utcc.utoronto.ca/~cks/space/blog/sysadmin/PromtailRsyslogForwarderSetup), therefore you must first use [Rsyslog](https://www.rsyslog.com/doc/master/installation/index.html) as an intermediate log converter. Rsyslog can be installed on a separate host that Promtail and the BIG-IP exporter are on. Below are the steps to get Rsyslog running:

1. Install Rsyslog: If not already installed, get it from the package manager of your choice.
2. Configure Rsyslog: Edit `/etc/rsyslog.conf` or create a new configuration file in `/etc/rsyslog.d/`. Add the following:

Bash ![Copy code to clipboard](/media/images/icons/icon-copy-small-2.svg) Copy

```bash
module(load="imudp")
module(load="imtcp")

input(type="imudp" port="50514")
input(type="imtcp" port="50514")

*.*  action(type="omfwd"
      protocol="tcp" target="127.0.0.1" port="40514"
      Template="RSYSLOG_SyslogProtocol23Format"
      TCP_Framing="octet-counted" KeepAlive="on"
      action.resumeRetryCount="-1"
      queue.type="linkedlist" queue.size="50000")
```

3. Restart Rsyslog: Apply the new settings with the following command:

![Copy code to clipboard](/media/images/icons/icon-copy-small-2.svg) Copy

```none
sudo systemctl restart rsyslog
```

4. Verify Operation: Check `/var/log/syslog` for any Rsyslog errors.

### Forwarding logs to Loki using Promtail

Finally, after [installing Promtail](/docs/loki/latest/setup/install/) with your method of choice, you will need to create a YAML configuration file. This file serves to integrate Rsyslog, Promtail, and Loki, allowing them to work cohesively. For an example and further explanation on how these components interact, refer to [this guide](https://utcc.utoronto.ca/~cks/space/blog/sysadmin/PromtailRsyslogForwarderSetup). The resulting YAML configuration should look similar to the one below:

YAML ![Copy code to clipboard](/media/images/icons/icon-copy-small-2.svg) Copy

```yaml
server:
  http_listen_port: 9080
  grpc_listen_port: 0

positions:
  filename: /tmp/positions.yaml

clients:
  - url: https://<user>:<pass>@logs-prod3.grafana.net/loki/api/v1/push

scrape_configs:
  - job_name: syslog
    syslog:
      listen_address: 0.0.0.0:40514
      idle_timeout: 12h
      listen_protocol: "udp"
      labels:
        job: "syslog"
    relabel_configs:
      - source_labels: ['__syslog_message_hostname']
        target_label: host
      - source_labels: ['__syslog_message_severity']
        target_label: level
      - source_labels: ['__syslog_message_facility']
        target_label: syslog_facility
      - source_labels: ['__syslog_message_app_name']
        target_label: syslog_identifier
```

Note, this is a separate Promtail YAML config, not the Alloy config where the metric scrapes are defined.

The clients credentials in the Promtail config must be updated with the correct credentials `https://<user>:<pass>@logs-prod3.grafana.net/loki/api/v1/push`. Depending on how Promtail was installed, Promtail will use the YAML configuration.

## Install F5 BIG-IP integration for Grafana Cloud

1. In your Grafana Cloud stack, click **Connections** in the left-hand menu.
2. Find **F5 BIG-IP** and click its tile to open the integration.
3. Review the prerequisites in the **Configuration Details** tab and set up Grafana Alloy to send F5 BIG-IP metrics to your Grafana Cloud instance.
4. Click **Install** to add this integration’s pre-built dashboards and alerts to your Grafana Cloud instance, and you can start monitoring your F5 BIG-IP setup.

## Configuration snippets for Grafana Alloy

### Advanced mode

The following snippets provide examples to guide you through the configuration process.

To instruct Grafana Alloy to scrape your F5 BIG-IP instances, **manually** copy and append the snippets to your alloy configuration file, then follow subsequent instructions.

### Advanced metrics snippets

Alloy ![Copy code to clipboard](/media/images/icons/icon-copy-small-2.svg) Copy

```alloy
prometheus.scrape "metrics_integrations_integrations_f5_bigip" {
	targets = [{
		__address__ = "<your-node-hostname>:9142",
	}]
	forward_to = [prometheus.remote_write.metrics_service.receiver]
	job_name   = "integrations/f5-bigip"
}
```

To monitor your F5 BIG-IP instance, you must use a [discovery.relabel](/docs/alloy/latest/reference/components/discovery.relabel/) component to discover your F5 BIG-IP Prometheus endpoint and apply appropriate labels, followed by a [prometheus.scrape](/docs/alloy/latest/reference/components/prometheus.scrape) component to scrape it.

Configure the following properties within each `discovery.relabel` component:

- `__address__`: The address to your F5 BIG-IP Prometheus metrics endpoint.
- `instance` label: `constants.hostname` sets the `instance` label to your Grafana Alloy server hostname. If that is not suitable, change it to a value uniquely identifies this F5 BIG-IP instance.

If you have multiple F5 BIG-IP servers to scrape, configure one `discovery.relabel` for each and scrape them by including each under `targets` within the `prometheus.scrape` component.

## Dashboards

The F5 BIG-IP integration installs the following dashboards in your Grafana Cloud instance to help monitor your system.

- BIG-IP cluster overview
- BIG-IP logs
- BIG-IP node overview
- BIG-IP pool overview
- BIG-IP virtual server overview

**F5 BIG-IP cluster overview 1**

**F5 BIG-IP node overview 1**

**F5 BIG-IP pool overview 1**

## Alerts

The F5 BIG-IP integration includes the following useful alerts:

Expand table

| Alert                          | Description                                                                                                                |
|--------------------------------|----------------------------------------------------------------------------------------------------------------------------|
| BigIPLowNodeAvailabilityStatus | Critical: Detecting a significant number of unavailable nodes which can causes potential downtime or degraded performance. |
| BigIPServerSideConnectionLimit | Warning: Approaching the connection limit may lead to rejecting new connections, impacting availability.                   |
| BigIPHighRequestRate           | Warning: An unexpected spike in requests might indicate an issue like a DDoS attack or unexpected high load.               |
| BigIPHighConnectionQueueDepth  | Warning: A sudden spike or sustained high queue depth may indicate a bottleneck in handling incoming connections.          |

## Metrics

The most important metrics provided by the F5 BIG-IP integration, which are used on the pre-built dashboards and Prometheus alerts, are as follows:

- bigip\_node\_cur\_sessions
- bigip\_node\_serverside\_bytes\_in
- bigip\_node\_serverside\_bytes\_out
- bigip\_node\_serverside\_cur\_conns
- bigip\_node\_serverside\_max\_conns
- bigip\_node\_serverside\_pkts\_in
- bigip\_node\_serverside\_pkts\_out
- bigip\_node\_status\_availability\_state
- bigip\_node\_tot\_requests
- bigip\_pool\_active\_member\_cnt
- bigip\_pool\_connq\_depth
- bigip\_pool\_connq\_serviced
- bigip\_pool\_min\_active\_members
- bigip\_pool\_serverside\_bytes\_in
- bigip\_pool\_serverside\_bytes\_out
- bigip\_pool\_serverside\_cur\_conns
- bigip\_pool\_serverside\_max\_conns
- bigip\_pool\_serverside\_pkts\_out
- bigip\_pool\_status\_availability\_state
- bigip\_pool\_tot\_requests
- bigip\_vs\_clientside\_bytes\_in
- bigip\_vs\_clientside\_bytes\_out
- bigip\_vs\_clientside\_cur\_conns
- bigip\_vs\_clientside\_evicted\_conns
- bigip\_vs\_clientside\_max\_conns
- bigip\_vs\_clientside\_pkts\_in
- bigip\_vs\_clientside\_pkts\_out
- bigip\_vs\_cs\_mean\_conn\_dur
- bigip\_vs\_ephemeral\_bytes\_in
- bigip\_vs\_ephemeral\_bytes\_out
- bigip\_vs\_ephemeral\_cur\_conns
- bigip\_vs\_ephemeral\_evicted\_conns
- bigip\_vs\_ephemeral\_max\_conns
- bigip\_vs\_ephemeral\_pkts\_in
- bigip\_vs\_ephemeral\_pkts\_out
- bigip\_vs\_status\_availability\_state
- bigip\_vs\_tot\_requests
- up

## Changelog

md ![Copy code to clipboard](/media/images/icons/icon-copy-small-2.svg) Copy

```md
# 1.0.2 - December 2024

- Only return latest metric in status panel check query
- Update mixin

# 1.0.1 - November 2024

- Update status panel check queries

# 1.0.0 - October 2023

* Initial release
```

## Cost

By connecting your F5 BIG-IP instance to Grafana Cloud, you might incur charges. To view information on the number of active series that your Grafana Cloud account uses for metrics included in each Cloud tier, see [Active series and dpm usage](/docs/grafana-cloud/fundamentals/active-series-and-dpm/) and [Cloud tier pricing](/products/cloud/pricing/).
