This page describes the steps required to install Database Collector on Linux (ZIP). 

Ensure that the machine on which you install the Database Collector has network access to the databases you want to monitor.

Perform the following steps:

  1. Go to https://appdynamics.jfrog.io/ui/native/zip-hosted/appdcloud/collectors/.
  2. Download the zip file version that is appropriate for your OS environment. 
    For example, /db-collector-linux-amd64/23.6.0-780/db-collector-linux-amd64-23.6.0-780.zip

  3. Extract the zip file to any directory.

  4. Update the conf/appddbcollector.yaml configuration file in the extracted folder:

    appddbcollector.yaml

    appdynamics_credentials:
      client_id: <client-id>
      client_secret: <secret>
      endpoint: <data-endpoint>
      token_url: <auth-endpoint>  
    
    # Set below fields in the config to provide SSL details
    # tlsConfig:
    #  certificate: <certificate>
    #  hostNameInCertificate: <hostname>
    
    # Set below field in the config to specify environment (defaults to self-hosted)
    # environment:
    #  platform: self-hosted # Other possible properties "AWS", "Azure"
    
    monitoring_config:
      sqlserver/1:
        configName: ${CONFIG_NAME}
        hostname: ${HOSTNAME}
        hostport: ${HOSTPORT}
        username: ${USERNAME}
        password: ${PASSWORD}
        database: ${DATABASE}
        tlsConfig:
          certificate: ${CERTIFICATE_CRT}
          hostNameInCertificate: ${HOSTNAMEINCERTIFICATE}
        environment:
          platform: ${CLOUD_CONFIG}
      mysql/1:
        configName: ${CONFIG_NAME}
        hostname: ${HOSTNAME}
        hostport: ${HOSTPORT}
        username: ${USERNAME}
        password: ${PASSWORD}
        environment:
          platform: ${CLOUD_CONFIG}
        tlsConfig:
          certificate: ${CERTIFICATE_CRT}
          hostNameInCertificate: ${HOSTNAMEINCERTIFICATE}
      aurora-mysql/1:
        configName: ${CONFIG_NAME}
        hostname: ${HOSTNAME}
        hostport: ${HOSTPORT}
        username: ${USERNAME}
        password: ${PASSWORD}
        environment:
          platform: ${CLOUD_CONFIG}
        tlsConfig:
          certificate: ${CERTIFICATE_CRT}
          hostNameInCertificate: ${HOSTNAMEINCERTIFICATE}
      mariadb/1:
        configName: ${CONFIG_NAME}
        hostname: ${HOSTNAME}
        hostport: ${HOSTPORT}
        username: ${USERNAME}
        password: ${PASSWORD}
        environment:
          platform: ${CLOUD_CONFIG}
        tlsConfig:
          certificate: ${CERTIFICATE_CRT}
          hostNameInCertificate: ${HOSTNAMEINCERTIFICATE} 
      aurora-postgresql/1:
        configName: ${CONFIG_NAME}
        hostname: ${HOSTNAME}
        hostport: ${HOSTPORT}
        username: ${USERNAME}
        password: ${PASSWORD}
        environment:
          platform: ${CLOUD_CONFIG}
        tlsConfig:
          certificate: ${CERTIFICATE_CRT}
      postgres/1:
        configName: ${CONFIG_NAME}
        hostname: ${HOSTNAME}
        hostport: ${HOSTPORT}
        username: ${USERNAME}
        password: ${PASSWORD}
        environment:
          platform: ${CLOUD_CONFIG}
        tlsConfig:
          certificate: ${CERTIFICATE_CRT}
    YML

    • Specify aws or azure on the platform field. Keep the field empty if you are not using any of these platforms.
    • By default, logs are available in the logs directory of the extracted folder.
  5. Change the permission of bin/appddbcollector that exists inside the extracted folder.
    For example, you can use the following command:

    chmod +x bin/appddbcollector
    CODE
  6. Start the Database Collector:

    ./bin/appddbcollector.sh
    CODE

    To check the logs, open the appddbcollector.log file.