Documentation

Create a Chronograf HA configuration

To create a Chronograf high-availability (HA) configuration using an etcd cluster as a shared data store, do the following:

  1. Install and start etcd
  2. Set up a load balancer for Chronograf
  3. Start Chronograf

Have an existing Chronograf configuration store that you want to use with a Chronograf HA configuration? Learn how to migrate your Chrongraf configuration to a shared data store.

Architecture

UserUserUserUserLoad BalancerChronografChronografChronografetcd Cluster

Install and start etcd

  1. Download the latest etcd release from GitHub. (For detailed installation instructions specific to your operating system, see Install and deploy etcd.)
  2. Extract the etcd binary and place it in your system PATH.
  3. Start etcd.

Start Chronograf

Run the following command to start Chronograf using etcd as the storage layer. The syntax depends on whether you’re using command line flags or the ETCD_ENDPOINTS environment variable.

Define etcd endpoints with command line flags
# Syntax
chronograf --etcd-endpoints=<etcd-host>
# Examples

# Add a single etcd endpoint when starting Chronograf

chronograf --etcd-endpoints=localhost:2379

# Add multiple etcd endpoints when starting Chronograf
chronograf \
  --etcd-endpoints=localhost:2379 \
  --etcd-endpoints=192.168.1.61:2379 \
  --etcd-endpoints=192.192.168.1.100:2379
Define etcd endpoints with the ETCD_ENDPOINTS environment variable

# Provide etcd endpoints in a comma-separated list
export ETCD_ENDPOINTS=localhost:2379,192.168.1.61:2379,192.192.168.1.100:2379

# Start Chronograf
chronograf
Define etcd endpoints with TLS enabled

Use the --etcd-cert flag to specify the path to the etcd PEM-encoded public certificate file and the --etcd-key flag to specify the path to the private key associated with the etcd certificate.

chronograf --etcd-endpoints=localhost:2379 \
  --etcd-cert=path/to/etcd-certificate.pem \
  --etcd-key=path/to/etcd-private-key.key

For more information, see Chronograf etcd configuration options.


Was this page helpful?

Thank you for your feedback!


The future of Flux

Flux is going into maintenance mode. You can continue using it as you currently are without any changes to your code.

Read more

InfluxDB v3 enhancements and InfluxDB Clustered is now generally available

New capabilities, including faster query performance and management tooling advance the InfluxDB v3 product line. InfluxDB Clustered is now generally available.

InfluxDB v3 performance and features

The InfluxDB v3 product line has seen significant enhancements in query performance and has made new management tooling available. These enhancements include an operational dashboard to monitor the health of your InfluxDB cluster, single sign-on (SSO) support in InfluxDB Cloud Dedicated, and new management APIs for tokens and databases.

Learn about the new v3 enhancements


InfluxDB Clustered general availability

InfluxDB Clustered is now generally available and gives you the power of InfluxDB v3 in your self-managed stack.

Talk to us about InfluxDB Clustered