PostgreSQL
The PostgreSQL integration collects database-usage metrics, such as the databasesize, the number of backends, or the number of operations. The integration alsocollects PostgreSQL logs and parses them into a JSON payload. This resultincludes fields for role, user, level, and message.
For more information about PostgreSQL, see thePostgreSQL documentation.
Prerequisites
To collect PostgreSQL telemetry, you mustinstall the Ops Agent:
- For metrics, install version 2.21.0 or higher.
- For logs, install version 2.9.0 or higher.
This integration supports PostgreSQL version 10.18+.
Configure your PostgreSQL instance
Thepostgresql receiver connects by default to a localpostgresqlserver using a Unix socket and Unix authentication as theroot user.
Configure the Ops Agent for PostgreSQL
Following the guide toConfigure the OpsAgent, add the required elementsto collect telemetry from PostgreSQL instances, andrestart the agent.
Example configuration
The following commands create the configuration to collect and ingest telemetryfor PostgreSQL:
#ConfiguresOpsAgenttocollecttelemetryfromtheapp.Youmustrestarttheagentfortheconfigurationtotakeeffect.set-e#Checkifthefileexistsif[!-f/etc/google-cloud-ops-agent/config.yaml];then#Createthefileifitdoesn't exist. sudo mkdir -p /etc/google-cloud-ops-agent sudo touch /etc/google-cloud-ops-agent/config.yamlfi# Create a back up of the existing file so existing configurations are not lost.sudo cp /etc/google-cloud-ops-agent/config.yaml /etc/google-cloud-ops-agent/config.yaml.bak# Configure the Ops Agent.sudo tee /etc/google-cloud-ops-agent/config.yaml > /dev/null << EOFmetrics: receivers: postgresql: type: postgresql username: postgres password: abc123 # To use the googlesecretmanager provider to replace plaintext passwords, refer to the example below. # password: ${googlesecretmanager:projects/<project-id>/secrets/<secret-id>/versions/<version-id>} insecure: true endpoint: localhost:5432 service: pipelines: postgresql: receivers: - postgresqllogging: receivers: postgresql_general: type: postgresql_general service: pipelines: postgresql: receivers: - postgresql_generalEOFFor these changes to take effect, you must restart the Ops Agent:
Linux
- To restart the agent, run the following command on your instance:
sudo systemctl restart google-cloud-ops-agent
- To confirm that the agent restarted, run the following command and verify that the components "Metrics Agent" and "Logging Agent" started:
sudo systemctl status "google-cloud-ops-agent*"
Windows
- Connect to your instance using RDP or a similar tool and login to Windows.
- Open a PowerShell terminal with administrator privileges by right-clicking the PowerShell icon and selectingRun as Administrator
- To restart the agent, run the following PowerShell command:
Restart-Service google-cloud-ops-agent -Force
- To confirm that the agent restarted, run the following command and verify that the components "Metrics Agent" and "Logging Agent" started:
Get-Service google-cloud-ops-agent*
Configure logs collection
To ingest logs from PostgreSQL, you must create a receiver for the logsthat PostgreSQL produces and then create a pipeline for the new receiver.
To configure a receiver for yourpostgresql_general logs, specify the followingfields:
| Field | Default | Description |
|---|---|---|
exclude_paths | A list of filesystem path patterns to exclude from the set matched byinclude_paths. | |
include_paths | [/var/log/postgresql/postgresql*.log, /var/lib/pgsql/data/log/postgresql*.log, /var/lib/pgsql/*/data/log/postgresql*.log] | A list of filesystem paths to read by tailing each file. A wild card (*) can be used in the paths. |
record_log_file_path | false | If set totrue, then the path to the specific file from which the log record was obtained appears in the output log entry as the value of theagent.googleapis.com/log_file_path label. When using a wildcard, only the path of the file from which the record was obtained is recorded. |
type | This value must bepostgresql_general. | |
wildcard_refresh_interval | 60s | The interval at which wildcard file paths ininclude_paths are refreshed. Given as atime duration, for example30s or2m. This property might be useful under high logging throughputs where log files are rotated faster than the default interval. |
What is logged
ThelogName is derived fromthe receiver IDs specified in the configuration. Detailed fields inside theLogEntryare as follows.
Thepostgresql_general logs contain the following fields in theLogEntry:
| Field | Type | Description |
|---|---|---|
jsonPayload.database | string | Database name for the action being logged when relevant |
jsonPayload.level | string | Log severity or type of database interaction type for some logs |
jsonPayload.message | string | Log of the database action |
jsonPayload.tid | number | Thread ID where the log originated |
jsonPayload.user | string | Authenticated user for the action being logged when relevant |
severity | string (LogSeverity) | Log entry level (translated). |
Configure metrics collection
To ingest metrics from PostgreSQL, you must create a receiver for the metricsthat PostgreSQL produces and then create a pipeline for the new receiver.
This receiver does notsupport the use of multiple instances in the configuration, for example, tomonitor multiple endpoints. All such instances write to the same time series,and Cloud Monitoring has no way to distinguish among them.
To configure a receiver for yourpostgresql metrics, specify the followingfields:
| Field | Default | Description |
|---|---|---|
ca_file | Path to the CA certificate. As a client, this verifies the server certificate. If empty, the receiver uses the system root CA. | |
cert_file | Path to the TLS certificate to use for mTLS-required connections. | |
collection_interval | 60s | Atime duration value, such as30s or5m. |
endpoint | /var/run/postgresql/.s.PGSQL.5432 | Thehostname:port or Unix socket path starting with/ used to connect to the PostgreSQL server. |
insecure | true | Sets whether or not to use a secure TLS connection. If set tofalse, then TLS is enabled. |
insecure_skip_verify | false | Sets whether or not to skip verifying the certificate. Ifinsecure is set totrue, then theinsecure_skip_verify value is not used. |
key_file | Path to the TLS key to use for mTLS-required connections. | |
password | The password used to connect to the server. | |
type | This value must bepostgresql. | |
username | The username used to connect to the server. |
What is monitored
The following table provides the list of metrics that the Ops Agent collectsfrom the PostgreSQL instance.
| Metric type | |
|---|---|
| Kind, Type Monitored resources | Labels |
workload.googleapis.com/postgresql.backends | |
GAUGE, INT64gce_instance | database |
workload.googleapis.com/postgresql.bgwriter.buffers.allocated | |
CUMULATIVE, INT64gce_instance | |
workload.googleapis.com/postgresql.bgwriter.buffers.writes | |
CUMULATIVE, INT64gce_instance | source |
workload.googleapis.com/postgresql.bgwriter.checkpoint.count | |
CUMULATIVE, INT64gce_instance | type |
workload.googleapis.com/postgresql.bgwriter.duration | |
CUMULATIVE, INT64gce_instance | type |
workload.googleapis.com/postgresql.bgwriter.maxwritten | |
CUMULATIVE, INT64gce_instance | |
workload.googleapis.com/postgresql.blocks_read | |
CUMULATIVE, INT64gce_instance | databasesourcetable |
workload.googleapis.com/postgresql.commits | |
CUMULATIVE, INT64gce_instance | database |
workload.googleapis.com/postgresql.connection.max | |
GAUGE, INT64gce_instance | |
workload.googleapis.com/postgresql.database.count | |
GAUGE, INT64gce_instance | |
workload.googleapis.com/postgresql.db_size | |
GAUGE, INT64gce_instance | database |
workload.googleapis.com/postgresql.index.scans | |
CUMULATIVE, INT64gce_instance | databaseindextable |
workload.googleapis.com/postgresql.index.size | |
GAUGE, INT64gce_instance | databaseindextable |
workload.googleapis.com/postgresql.operations | |
CUMULATIVE, INT64gce_instance | databaseoperationtable |
workload.googleapis.com/postgresql.replication.data_delay | |
GAUGE, INT64gce_instance | replication_client |
workload.googleapis.com/postgresql.rollbacks | |
CUMULATIVE, INT64gce_instance | database |
workload.googleapis.com/postgresql.rows | |
GAUGE, INT64gce_instance | databasestatetable |
workload.googleapis.com/postgresql.table.count | |
GAUGE, INT64gce_instance | database |
workload.googleapis.com/postgresql.table.size | |
GAUGE, INT64gce_instance | databasetable |
workload.googleapis.com/postgresql.table.vacuum.count | |
CUMULATIVE, INT64gce_instance | databasetable |
workload.googleapis.com/postgresql.wal.age | |
GAUGE, INT64gce_instance | |
workload.googleapis.com/postgresql.wal.lag | |
GAUGE, INT64gce_instance | operationreplication_client |
Verify the configuration
This section describes how to verify that you correctly configured thePostgreSQL receiver. It might take one or twominutes for the Ops Agent to begin collecting telemetry.
To verify that PostgreSQL logs are being sent toCloud Logging, do the following:
In the Google Cloud console, go to theLogs Explorer page:
If you use the search bar to find this page, then select the result whose subheading isLogging.
- Enter the following query in the editor, and then clickRun query:
resource.type="gce_instance"log_id("postgresql_general")
To verify that PostgreSQL metrics are being sent toCloud Monitoring, do the following:
In the Google Cloud console, go to theleaderboard Metrics explorer page:
If you use the search bar to find this page, then select the result whose subheading isMonitoring.
- In the toolbar of thequery-builder pane, select the button whose name is eithercode MQL orcode PromQL.
- Verify thatPromQL is selectedin theLanguage toggle. The language toggle is in the same toolbar thatlets you format your query.
- Enter the following query in the editor, and then clickRun query:
{"workload.googleapis.com/postgresql.backends", monitored_resource="gce_instance"}
View dashboard
To view your PostgreSQL metrics, you must have a chart or dashboardconfigured.The PostgreSQL integration includes one or more dashboards for you.Any dashboards are automatically installed after you configure theintegration and the Ops Agent has begun collecting metric data.
You can also view static previews of dashboards withoutinstalling the integration.
To view an installed dashboard, do the following:
In the Google Cloud console, go to the
Dashboards page:If you use the search bar to find this page, then select the result whose subheading isMonitoring.
- Select theDashboard List tab, and then choose theIntegrations category.
- Click the name of the dashboard you want to view.
If you have configured an integration but the dashboard has not beeninstalled, then check that the Ops Agent is running. When there is nometric data for a chart in the dashboard, installation of the dashboard fails.After the Ops Agent begins collecting metrics, the dashboard is installedfor you.
To view a static preview of the dashboard, do the following:
In the Google Cloud console, go to the
Integrations page:If you use the search bar to find this page, then select the result whose subheading isMonitoring.
- Click theCompute Engine deployment-platform filter.
- Locate the entry for PostgreSQL and clickView Details.
- Select theDashboards tab to see a static preview. If the dashboard is installed, then you can navigate to it by clickingView dashboard.
For more information about dashboards in Cloud Monitoring, seeDashboards and charts.
For more information about using theIntegrations page, seeManage integrations.
Install alerting policies
Alerting policies instruct Cloud Monitoring to notify you whenspecified conditions occur.The PostgreSQL integration includes one or more alerting policies foryou to use.You can view and installthese alerting policies from theIntegrations page inMonitoring.
To view the descriptions of available alerting policies and install them, do the following:
In the Google Cloud console, go to the
Integrations page:If you use the search bar to find this page, then select the result whose subheading isMonitoring.
- Locate the entry for PostgreSQL and clickView Details.
- Select theAlerts tab. This tab provides descriptions of available alerting policies and provides an interface for installing them.
- Install alerting policies. Alerting policies need to know where to send notifications that the alert has been triggered, so they require information from you for installation. To install alerting policies, do the following:
- From the list of available alerting policies, select those that you want to install.
In theConfigure notifications section, select one or more notification channels. You have the option to disable the use of notification channels, but if you do, then your alerting policies fire silently. You can check their status in Monitoring, but you receive no notifications.
For more information about notification channels, seeManage notification channels.
- ClickCreate Policies.
For more information about alerting policies in Cloud Monitoring, seeIntroduction to alerting.
For more information about using theIntegrations page, seeManage integrations.
What's next
For a walkthrough on how to use Ansible to install the Ops Agent, configurea third-party application, and install a sample dashboard, see theInstall the Ops Agent to troubleshoot third-party applications video.
Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2025-11-05 UTC.