SigNoz
Docs
PricingCustomers
Get Started - Free
Docs
IntroductionContributingMigrate from DatadogSigNoz API
OpenTelemetry
What is OpenTelemetryOpenTelemetry Collector GuideOpenTelemetry Demo
Community
Support
Slack
X
Launch Week
Changelog
Dashboard Templates
DevOps Wordle
Newsletter
KubeCon, Atlanta 2025
More
SigNoz vs DatadogSigNoz vs New RelicSigNoz vs GrafanaSigNoz vs Dynatrace
Careers
AboutTermsPrivacySecurity & Compliance
SigNoz Logo
SigNoz
All systems operational
HIPAASOC-2
SigNoz Cloud - This page applies to SigNoz Cloud editions.
Self-Host - This page applies to self-hosted SigNoz editions.

Monitor AWS Application Load Balancer with SigNoz

Overview

AWS Application Load Balancer (ALB) operates at the application layer (Layer 7) and routes HTTP/HTTPS traffic. SigNoz helps you monitor ALB performance, request patterns, and error rates.

Prerequisites

  • AWS account with appropriate permissions
  • SigNoz Cloud account or Self-Hosted SigNoz

One-Click Integration

One-Click Integration is available for SigNoz Cloud only and includes pre-built dashboards. This method uses AWS CloudFormation and CloudWatch, which may incur additional AWS charges.

Step 1: Connect Your AWS Account

Follow the One-Click AWS Integrations Guide to:

  1. Deploy the CloudFormation stack
  2. Connect your AWS account to SigNoz

Step 2: Enable ALB Monitoring

Once connected, SigNoz will auto-discover your ALBs and begin collecting:

  • CloudWatch Metrics: Request count, latency, HTTP error codes, active connections

What's Collected

Data TypeSourceExamples
MetricsCloudWatchRequestCount, TargetResponseTime, HTTPCode_Target_2XX_Count, ActiveConnectionCount

Pre-built Dashboards

Navigate to Dashboards and search for "ALB" to find automatically imported dashboards.

Manual Setup (CloudWatch Exporter)

Manual setup works for both SigNoz Cloud and Self-Hosted. You'll need to set up your own dashboards.

To collect ALB metrics manually, you can use the Prometheus CloudWatch Exporter. This tool scrapes metrics from AWS CloudWatch and exposes them in Prometheus format, which the OpenTelemetry Collector can then scrape and forward to SigNoz.

Prerequisites

Before proceeding, ensure you have:

  • OpenTelemetry Collector installed and configured. See Get Started with OTel Collector.
  • Java 11 or higher installed on the host machine (for JAR-based setup), or Docker (for container-based setup).
  • AWS credentials configured via environment variables (AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY), IAM role, or ~/.aws/credentials.
  • IAM permissions for the credentials:
    • cloudwatch:ListMetrics
    • cloudwatch:GetMetricStatistics

Where to Run the CloudWatch Exporter

The CloudWatch Exporter should run on a machine that:

  1. Has network access to AWS CloudWatch APIs.
  2. Has AWS credentials configured.
  3. Is network-accessible from your OpenTelemetry Collector.

For SigNoz Cloud users, run the exporter on any EC2 instance, VM, or container with AWS credentials. The OTel Collector on the same host will forward metrics to SigNoz Cloud.

For Self-Hosted users, run the exporter on the same host as your OTel Collector, or ensure network connectivity between them.

Step 1: Create Configuration File

Create a file named alb-metrics.yaml with the following configuration:

alb-metrics.yaml
region: <aws-region>
metrics:
  - aws_namespace: AWS/ApplicationELB
    aws_metric_name: RequestCount
    aws_dimensions: [LoadBalancer]
    aws_statistics: [Sum]

  - aws_namespace: AWS/ApplicationELB
    aws_metric_name: TargetResponseTime
    aws_dimensions: [LoadBalancer]
    aws_statistics: [Average]
    aws_extended_statistics: [p99]

  - aws_namespace: AWS/ApplicationELB
    aws_metric_name: HTTPCode_Target_2XX_Count
    aws_dimensions: [LoadBalancer]
    aws_statistics: [Sum]

  - aws_namespace: AWS/ApplicationELB
    aws_metric_name: HTTPCode_Target_4XX_Count
    aws_dimensions: [LoadBalancer]
    aws_statistics: [Sum]

  - aws_namespace: AWS/ApplicationELB
    aws_metric_name: HTTPCode_Target_5XX_Count
    aws_dimensions: [LoadBalancer]
    aws_statistics: [Sum]

  - aws_namespace: AWS/ApplicationELB
    aws_metric_name: ActiveConnectionCount
    aws_dimensions: [LoadBalancer]
    aws_statistics: [Sum]

Verify these values:

  • <aws-region>: Your AWS region where ALBs are deployed (e.g., us-east-1, eu-west-1, ap-south-1).

See example configurations for more service templates.

Step 2: Download and Run the Exporter

Download the CloudWatch Exporter JAR file using curl:

curl -LO https://repo1.maven.org/maven2/io/prometheus/cloudwatch/cloudwatch_exporter/0.16.0/cloudwatch_exporter-0.16.0-jar-with-dependencies.jar

Run the exporter with Java:

java -jar cloudwatch_exporter-0.16.0-jar-with-dependencies.jar 9106 alb-metrics.yaml

This starts the exporter on port 9106.

Run the CloudWatch Exporter as a Docker container:

docker run -d \
  --name cloudwatch-exporter \
  -p 9106:9106 \
  -v $(pwd)/alb-metrics.yaml:/config/config.yml \
  -e AWS_ACCESS_KEY_ID=$AWS_ACCESS_KEY_ID \
  -e AWS_SECRET_ACCESS_KEY=$AWS_SECRET_ACCESS_KEY \
  prom/cloudwatch-exporter

Replace the AWS credential environment variables with your actual credentials or use an IAM role if running on EC2.

Verify the exporter is running by checking the metrics endpoint:

curl http://localhost:9106/metrics | grep aws_applicationelb

You should see metrics like aws_applicationelb_request_count_sum, aws_applicationelb_target_response_time_average, etc.

Step 3: Configure OpenTelemetry Collector

Add the following prometheus receiver to your existing otel-collector-config.yaml to scrape the CloudWatch Exporter:

otel-collector-config.yaml
receivers:
  prometheus:
    config:
      scrape_configs:
        - job_name: 'alb-cloudwatch'
          scrape_interval: 60s
          static_configs:
            - targets: ['<exporter-host>:9106']

Verify these values:

  • <exporter-host>: The hostname or IP where the CloudWatch Exporter is running. Use localhost if running on the same machine.

Enable the prometheus receiver in your metrics pipeline by updating the service section:

otel-collector-config.yaml
service:
  pipelines:
    metrics:
      receivers: [otlp, prometheus]
      processors: [batch]
      exporters: [otlp]

Append these configurations to your existing otel-collector-config.yaml. Do not replace your entire configuration file.

Restart your OpenTelemetry Collector to apply the changes.

Validate

To confirm that ALB metrics are flowing to SigNoz:

  1. Navigate to Dashboards → New Dashboard → New Panel in SigNoz.
  2. In the query builder, search for metrics starting with aws_applicationelb_ (e.g., aws_applicationelb_request_count_sum).
  3. Verify that metrics appear with load_balancer labels matching your ALBs.

If you see metrics with labels like load_balancer, your setup is working correctly.

Collecting ALB Access Logs

ALB access logs are typically stored in S3. Use the S3 Lambda Forwarder pattern:

  1. Enable ALB access logging to an S3 bucket
  2. Create a Lambda function triggered by S3 events
  3. Parse and forward logs to SigNoz

See ELB Logs for the detailed S3 Lambda Forwarder setup.

Next Steps

Once ALB metrics are flowing to SigNoz, you can:

  • Set up alerts for critical metrics like error rates or latency. See Alerts.
  • Create dashboards to visualize ALB performance. See Dashboards.
  • Collect access logs for detailed request analysis. See ELB Logs.

Last updated: December 28, 2025

Edit on GitHub

Was this page helpful?

Your response helps us improve this page.

Prev
One-Click vs Manual
Next
API Gateway
On this page
Overview
Prerequisites
One-Click Integration
Step 1: Connect Your AWS Account
Step 2: Enable ALB Monitoring
What's Collected
Pre-built Dashboards
Manual Setup (CloudWatch Exporter)
Prerequisites
Where to Run the CloudWatch Exporter
Step 1: Create Configuration File
Step 2: Download and Run the Exporter
Step 3: Configure OpenTelemetry Collector
Validate
Collecting ALB Access Logs
Next Steps

Is this page helpful?

Your response helps us improve this page.