Upstream OpenTelemetry Collectors and language SDKs
editUpstream OpenTelemetry Collectors and language SDKs
edit[preview] This functionality is in technical preview and may be changed or removed in a future release. Elastic will work to fix any issues, but features in technical preview are not subject to the support SLA of official GA features.
This is one of several approaches you can use to integrate Elastic with OpenTelemetry. To compare approaches and choose the best approach for your use case, refer to Use OpenTelemetry with APM.
Elastic natively supports the OpenTelemetry protocol (OTLP). This means trace data and metrics collected from your applications and infrastructure can be sent directly to Elastic.
- Send data to Elastic from an upstream OpenTelemetry Collector
- Send data to Elastic from an upstream OpenTelemetry language SDK
Connect your OpenTelemetry Collector instances to Observability using the OTLP exporter:
receivers: # ... otlp: processors: # ... memory_limiter: check_interval: 1s limit_mib: 2000 batch: exporters: logging: loglevel: warn otlp/elastic: # Elastic https endpoint without the "https://" prefix endpoint: "${ELASTIC_APM_SERVER_ENDPOINT}" headers: # Elastic API key Authorization: "ApiKey ${ELASTIC_APM_API_KEY}" service: pipelines: traces: receivers: [otlp] processors: [..., memory_limiter, batch] exporters: [logging, otlp/elastic] metrics: receivers: [otlp] processors: [..., memory_limiter, batch] exporters: [logging, otlp/elastic] logs: receivers: [otlp] processors: [..., memory_limiter, batch] exporters: [logging, otlp/elastic]
The receivers, like the OTLP receiver, that forward data emitted by APM agents, or the host metrics receiver. |
|
We recommend using the Batch processor and the memory limiter processor. For more information, see recommended processors. |
|
The logging exporter is helpful for troubleshooting and supports various logging levels, like |
|
Observability endpoint configuration. Elastic supports a ProtoBuf payload via both the OTLP protocol over gRPC transport (OTLP/gRPC) and the OTLP protocol over HTTP transport (OTLP/HTTP). To learn more about these exporters, see the OpenTelemetry Collector documentation: OTLP/HTTP Exporter or OTLP/gRPC exporter. |
|
Hostname and port of the Elastic endpoint. For example, |
|
Credential for Elastic APM API key authorization ( |
|
Environment-specific configuration parameters can be conveniently passed in as environment variables documented here (e.g. |
|
[preview]
This functionality is in technical preview and may be changed or removed in a future release. Elastic will work to fix any issues, but features in technical preview are not subject to the support SLA of official GA features.
To send OpenTelemetry logs to your project, declare a |
You’re now ready to export traces and metrics from your services and applications.
When using the OpenTelemetry Collector, you should always prefer sending data via the OTLP
exporter.
Using other methods, like the elasticsearch
exporter, will bypass all of the validation and data processing that Elastic performs.
In addition, your data will not be viewable in your Observability project if you use the elasticsearch
exporter.
This document outlines how to send data directly from an upstream OpenTelemetry SDK to APM Server, which is appropriate when getting started. However, in many cases you should use the OpenTelemetry SDK to send data to an OpenTelemetry Collector that processes and exports data to APM Server. Read more about when and how to use a collector in the OpenTelemetry documentation.
To export traces and metrics to Elastic, instrument your services and applications with the OpenTelemetry API, SDK, or both. For example, if you are a Java developer, you need to instrument your Java app with the OpenTelemetry agent for Java. See the OpenTelemetry Instrumentation guides to download the OpenTelemetry agent or SDK for your language.
Define environment variables to configure the OpenTelemetry agent or SDK and enable communication with Elastic APM. For example, if you are instrumenting a Java app, define the following environment variables:
export OTEL_RESOURCE_ATTRIBUTES=service.name=checkoutService,service.version=1.1,deployment.environment=production export OTEL_EXPORTER_OTLP_ENDPOINT=https://apm_server_url:8200 export OTEL_EXPORTER_OTLP_HEADERS="Authorization=ApiKey an_apm_api_key" export OTEL_METRICS_EXPORTER="otlp" \ export OTEL_LOGS_EXPORTER="otlp" \ java -javaagent:/path/to/opentelemetry-javaagent-all.jar \ -classpath lib/*:classes/ \ com.mycompany.checkout.CheckoutServiceServer
[preview] This functionality is in technical preview and may be changed or removed in a future release. Elastic will work to fix any issues, but features in technical preview are not subject to the support SLA of official GA features. The OpenTelemetry logs intake via Elastic is currently in technical preview. |
|
Fields that describe the service and the environment that the service runs in. See resource attributes for more information. |
|
Elastic URL. The host and port that Elastic listens for APM events on. |
|
Authorization header that includes the Elastic APM API key: For information on how to format an API key, refer to Secure communication with APM agents. If you are using a version of the Python OpenTelemetry agent before 1.27.0, the content of the header must be URL-encoded. You can use the Python standard library’s |
|
Metrics exporter to use. See exporter selection for more information. |
|
Logs exporter to use. See exporter selection for more information. |
You are now ready to collect traces and metrics before verifying metrics and visualizing metrics.
Elastic supports both the (OTLP/gRPC) and (OTLP/HTTP) protocol on the same port as Elastic APM agent requests. For ease of setup, we recommend using OTLP/HTTP when proxying or load balancing requests to Elastic.
If you use the OTLP/gRPC protocol, requests to Elastic must use either HTTP/2 over TLS or HTTP/2 Cleartext (H2C). No matter which protocol is used, OTLP/gRPC requests will have the header: "Content-Type: application/grpc"
.
When using a layer 7 (L7) proxy like AWS ALB, requests must be proxied in a way that ensures requests to Elastic follow the rules outlined above. For example, with ALB you can create rules to select an alternative backend protocol based on the headers of requests coming into ALB. In this example, you’d select the gRPC protocol when the "Content-Type: application/grpc"
header exists on a request.
For more information on how to configure an AWS ALB to support gRPC, see this AWS blog post: Application Load Balancer Support for End-to-End HTTP/2 and gRPC.
For more information on how Elastic services gRPC requests, see Muxing gRPC and HTTP/1.1.
- Collect metrics
- Add Resource attributes
- Learn about the limitations of this integration