---
layout: docs
page_title: Anonymous product usage reporting
description: >-
  Learn about the anonymized data HashiCorp collects automatically for product
  usage reporting and how to enable or disable data collection.
---

> [!IMPORTANT]  
> **Documentation Update:** Product documentation, which were located in this repository under `/website`, are now located in [`hashicorp/web-unified-docs`](https://github.com/hashicorp/web-unified-docs), colocated with all other product documentation. Contributions to this content should be done in the `web-unified-docs` repo, and not this one. Changes made to `/website` content in this repo will not be reflected on the developer.hashicorp.com website.

# Anonymous product usage reporting

@include 'alerts/enterprise-only.mdx'

HashiCorp collects usage data about how Vault clusters are being used. Product usage
data is not used for billing or and is numerical only, and no sensitive information of
any nature is being collected. The data is collected as part of
the [license utilization reporting](/vault/docs/enterprise/license/utilization-reporting)
process and managed in a compliant manner. If automated reporting is enabled, this
data will be collected automatically.
If automated reporting is disabled, then this will be collected as part of the manual reports.

## Opt out

While none of the collected usage metrics are sensitive in any way, if you are still concerned
about these usage metrics being reported, then you can opt-out of them being collected.

If you are considering opting out because you’re worried about the data, we
strongly recommend that you review the [usage metrics list](#usage-metrics-list)
before opting out. If you have concerns with any of the automatically-reported
data please bring them to your account manager.

You have two options to opt out of product usage collection:

- HCL configuration (recommended)
- Environment variable (requires restart)


#### HCL configuration

Opting out in your product's configuration file doesn't require a system
restart, and is the method we recommend. Add the following block to your server
configuration file (e.g. `vault-config.hcl`).

```hcl
reporting {
  disable_product_usage_reporting = true
}
```

<Warning>

  When you have a cluster, each node must have the reporting stanza in its
  configuration to be consistent. In the event of leadership change, nodes will
  use its server configuration to determine whether or not to opt-out the
  product usage collection. Inconsistent configuration between nodes will change the
  reporting status upon active unseal.

</Warning>


You will find the following entry in the server log.

<CodeBlockConfig hideClipboard>

  ```
  [DEBUG] product usage reporting is disabled; usage metrics data will not be collected
  ```

</CodeBlockConfig>

#### Environment variable

If you need to, you can also opt out using an environment variable, which will
provide a startup message confirming that you have product usage data collection.
This option requires a system restart.

<Note>

  If the reporting stanza exists in the configuration file, the
  `OPTOUT_PRODUCT_USAGE_REPORTING` value overrides the configuration.

</Note>

Set the following environment variable.

```shell-session
$ export OPTOUT_PRODUCT_USAGE_REPORTING=true
```

Now, restart your [Vault servers](/vault/docs/commands/server) from the shell
where you set the environment variable.

You will find the following entries in the server log.

<CodeBlockConfig hideClipboard>

  ```
  [INFO] core: product usage reporting disabled via environment variable: env=OPTOUT_PRODUCT_USAGE_REPORTING
  [DEBUG] product usage reporting is disabled; usage metrics data will not be collected
  ```

</CodeBlockConfig>

If your configuration file and environment variable differ, the environment
variable setting will take precedence.

## Usage metrics list

HashiCorp collects the following product usage metrics as part of the `metrics` part of the
[JSON payload that it collects for licence utilization](/vault/docs/enterprise/license/utilization-reporting#example-payloads).
All of these metrics are numerical, and contain no sensitive values or additional metadata:

| Metric Name                                                         | Description                                                                                                |
|---------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------|
| `vault.namespaces.count`                                            | Total number of namespaces.                                                                                |
| `vault.leases.count`                                                | Total number of leases within Vault.                                                                       |
| `vault.quotas.ratelimit.count`                                      | Total number of rate limit quotas within Vault, considering any group_by modes.                            |
| `vault.quotas.ratelimit.ip.count`                                   | Total number of rate limit quotas using "ip" group_by mode within Vault.                                   |
| `vault.quotas.ratelimit.none.count`                                 | Total number of rate limit quotas using "none" group_by mode within Vault.                                 |
| `vault.quotas.ratelimit.entity_then_ip.count`                       | Total number of rate limit quotas using "entity_then_ip" group_by mode within Vault.                       |
| `vault.quotas.ratelimit.entity_then_ip_with_secondary_rate.count`   | Total number of rate limit quotas using "entity_then_ip" group_by mode with secondary rate within Vault.   |
| `vault.quotas.ratelimit.entity_then_none.count`                     | Total number of rate limit quotas using "entity_then_none" group_by mode within Vault.                     |
| `vault.quotas.ratelimit.entity_then_none_with_secondary_rate.count` | Total number of rate limit quotas using "entity_then_none" group_by mode with secondary rate within Vault. |
| `vault.quotas.leasecount.count`                                     | Total number of lease count quotas within Vault.                                                           |
| `vault.kv.version1.secrets.count`                                   | Total number of KVv1 secrets within Vault.                                                                 |
| `vault.kv.version2.secrets.count`                                   | Total number of KVv2 secrets within Vault.                                                                 |
| `vault.kv.version1.secrets.namespace.max`                           | The highest number of KVv1 secrets in a namespace in Vault, e.g. `1000`.                                   |
| `vault.kv.version2.secrets.namespace.max`                           | The highest number of KVv2 secrets in a namespace in Vault, e.g. `1000`.                                   |
| `vault.kv.version1.secrets.namespace.min`                           | The lowest number of KVv1 secrets in a namespace in Vault, e.g. `2`.                                       |
| `vault.kv.version2.secrets.namespace.min`                           | The highest number of KVv2 secrets in a namespace in Vault, e.g. `1000`.                                   |
| `vault.kv.version1.secrets.namespace.mean`                          | The mean number of KVv1 secrets in namespaces in Vault, e.g. `52.8`.                                       |
| `vault.kv.version2.secrets.namespace.mean`                          | The mean number of KVv2 secrets in namespaces in Vault, e.g. `52.8`.                                       |
| `vault.auth.method.approle.count`                                   | The total number of Approle auth mounts in Vault.                                                          |
| `vault.auth.method.alicloud.count`                                  | The total number of Alicloud auth mounts in Vault.                                                         |
| `vault.auth.method.aws.count`                                       | The total number of AWS auth mounts in Vault.                                                              |
| `vault.auth.method.appid.count`                                     | The total number of App ID auth mounts in Vault.                                                           |
| `vault.auth.method.azure.count`                                     | The total number of Azure auth mounts in Vault.                                                            |
| `vault.auth.method.cloudfoundry.count`                              | The total number of Cloud Foundry auth mounts in Vault.                                                    |
| `vault.auth.method.github.count`                                    | The total number of GitHub auth mounts in Vault.                                                           |
| `vault.auth.method.gcp.count`                                       | The total number of GCP auth mounts in Vault.                                                              |
| `vault.auth.method.jwt.count`                                       | The total number of JWT auth mounts in Vault.                                                              |
| `vault.auth.method.kerberos.count`                                  | The total number of Kerberos auth mounts in Vault.                                                         |
| `vault.auth.method.kubernetes.count`                                | The total number of Kubernetes auth mounts in Vault.                                                       |
| `vault.auth.method.ldap.count`                                      | The total number of LDAP auth mounts in Vault.                                                             |
| `vault.auth.method.oci.count`                                       | The total number of OCI auth mounts in Vault.                                                              |
| `vault.auth.method.okta.count`                                      | The total number of Okta auth mounts in Vault.                                                             |
| `vault.auth.method.pcf.count`                                       | The total number of PCF auth mounts in Vault.                                                              |
| `vault.auth.method.radius.count`                                    | The total number of Radius auth mounts in Vault.                                                           |
| `vault.auth.method.saml.count`                                      | The total number of SAML auth mounts in Vault.                                                             |
| `vault.auth.method.cert.count`                                      | The total number of Cert auth mounts in Vault.                                                             |
| `vault.auth.method.oidc.count`                                      | The total number of OIDC auth mounts in Vault.                                                             |
| `vault.auth.method.token.count`                                     | The total number of Token auth mounts in Vault.                                                            |
| `vault.auth.method.userpass.count`                                  | The total number of Userpass auth mounts in Vault.                                                         |
| `vault.auth.method.plugin.count`                                    | The total number of custom plugin auth mounts in Vault.                                                    |
| `vault.secret.engine.activedirectory.count`                         | The total number of Active Directory secret engines in Vault.                                              |
| `vault.secret.engine.alicloud.count`                                | The total number of Alicloud secret engines in Vault.                                                      |
| `vault.secret.engine.aws.count`                                     | The total number of AWS secret engines in Vault.                                                           |
| `vault.secret.engine.azure.count`                                   | The total number of Azure secret engines in Vault.                                                         |
| `vault.secret.engine.consul.count`                                  | The total number of Consul secret engines in Vault.                                                        |
| `vault.secret.engine.gcp.count`                                     | The total number of GCP secret engines in Vault.                                                           |
| `vault.secret.engine.gcpkms.count`                                  | The total number of GCPKMS secret engines in Vault.                                                        |
| `vault.secret.engine.kubernetes.count`                              | The total number of Kubernetes secret engines in Vault.                                                    |
| `vault.secret.engine.cassandra.count`                               | The total number of Cassandra secret engines in Vault.                                                     |
| `vault.secret.engine.keymgmt.count`                                 | The total number of Keymgmt secret engines in Vault.                                                       |
| `vault.secret.engine.kv.count`                                      | The total number of KV secret engines in Vault.                                                            |
| `vault.secret.engine.kmip.count`                                    | The total number of KMIP secret engines in Vault.                                                          |
| `vault.secret.engine.mongodb.count`                                 | The total number of MongoDB secret engines in Vault.                                                       |
| `vault.secret.engine.mongodbatlas.count`                            | The total number of MongoDBAtlas secret engines in Vault.                                                  |
| `vault.secret.engine.mssql.count`                                   | The total number of MSSql secret engines in Vault.                                                         |
| `vault.secret.engine.postgresql.count`                              | The total number of Postgresql secret engines in Vault.                                                    |
| `vault.secret.engine.nomad.count`                                   | The total number of Nomad secret engines in Vault.                                                         |
| `vault.secret.engine.ldap.count`                                    | The total number of LDAP secret engines in Vault.                                                          |
| `vault.secret.engine.openldap.count`                                | The total number of OpenLDAP secret engines in Vault.                                                      |
| `vault.secret.engine.pki.count`                                     | The total number of PKI secret engines in Vault.                                                           |
| `vault.secret.engine.rabbitmq.count`                                | The total number of RabbitMQ secret engines in Vault.                                                      |
| `vault.secret.engine.ssh.count`                                     | The total number of SSH secret engines in Vault.                                                           |
| `vault.secret.engine.terraform.count`                               | The total number of Terraform secret engines in Vault.                                                     |
| `vault.secret.engine.totp.count`                                    | The total number of TOTP secret engines in Vault.                                                          |
| `vault.secret.engine.transform.count`                               | The total number of Transform secret engines in Vault.                                                     |
| `vault.secret.engine.transit.count`                                 | The total number of Transit secret engines in Vault.                                                       |
| `vault.secret.engine.database.count`                                | The total number of Database secret engines in Vault.                                                      |
| `vault.secret.engine.plugin.count`                                  | The total number of custom plugin secret engines in Vault.                                                 |
| `vault.secretsync.sources.count`                                    | The total number of secret sources configured for secret sync.                                             |
| `vault.secretsync.destinations.count`                               | The total number of secret destinations configured for secret sync.                                        |
| `vault.secretsync.destinations.aws-sm.count`                        | The total number of AWS-SM secret destinations configured for secret sync.                                 |
| `vault.secretsync.destinations.azure-kv.count`                      | The total number of Azure-KV secret destinations configured for secret sync.                               |
| `vault.secretsync.destinations.gh.count`                            | The total number of GH secret destinations configured for secret sync.                                     |
| `vault.secretsync.destinations.vault.count`                         | The total number of Vault secret destinations configured for secret sync.                                  |
| `vault.secretsync.destinations.vercel-project.count`                | The total number of Vercel Project secret destinations configured for secret sync.                         |
| `vault.secretsync.destinations.terraform.count`                     | The total number of Terraform secret destinations configured for secret sync.                              |
| `vault.secretsync.destinations.gitlab.count`                        | The total number of GitLab secret destinations configured for secret sync.                                 |
| `vault.secretsync.destinations.inmem.count`                         | The total number of InMem secret destinations configured for secret sync.                                  |
| `vault.pki.roles.count`                                             | The total roles in all PKI mounts across all namespaces.                                                   |
| `vault.pki.issuers.count`                                           | The total issuers from all PKI mounts across all namespaces.                                               |
| `vault.identity.case_sensitive_mode`                                | Whether or not the cluster is using case-sensitive identity name matching caused by historical duplicates. |
| `vault.identity.force_deduplication_activated`                      | Whether or not the cluster has had the force_identity_deduplication activation flag activated.             |
| `vault.ui.enabled`                                                  | Whether or not the UI is enabled for the cluster.                                                          |
| `vault.ui.custom_banners.authenticated`                             | How many authenticated custom banners have been enabled across all namespaces.                             |
| `vault.ui.custom_banners.unauthenticated`                           | How many unauthenticated custom banners have been enabled across all namespaces.                           |
| `vault.storage.max_entry_size`                                      | The value of `max_entry_size` parameter for the storage stanza in the config.                              |
| `vault.storage.max_mount_and_namespace_table_entry_size`            | The value of `max_mount_and_namespace_table_entry_size` parameter for the storage stanza in the config.    |
| `vault.replication.secret.non_local_mounts`                         | The number of replicated secret mounts on Enterprise clusters.                                             |
| `vault.replication.secret.local_mounts`                             | The number of local secret mounts on Enterprise clusters.                                                  |
| `vault.replication.auth.local_mounts`                               | The number of local auth mounts on Enterprise clusters.                                                    |
| `vault.replication.auth.non_local_mounts`                           | The number of replicated auth mounts on Enterprise clusters.                                               |
| `vault.replication.num_nodes`                                       | The number of nodes in a HA cluster.                                                                       |
| `vault.adaptive_overload_protection_enabled`                        | Whether or not Adaptive Overload Protection is enabled for the cluster.                                    |
| `vault.policies.egp.count`                                          | The total number of Enterprise Governance Policies (EGP) across all namespaces in Vault.                   |
| `vault.policies.rgp.count`                                          | The total number of Replication Governance Policies (RGP) across all namespaces in Vault.                  |
| `vault.policies.acl.count`                                          | The total number of Access Control List (ACL) policies across all namespaces in Vault.                     |
| `vault.policies.acl.control_group.count`                            | The total number of control groups in this cluster.                                                        |
| `vault.autopilot_upgrade_enabled`                                   | Whether or not Autopilot Upgrade is enabled for the cluster.                                               |
| `vault.audit.device.file.count`                                     | The total number of audit devices of type file configured for this cluster.                                |
| `vault.audit.device.syslog.count`                                   | The total total number of audit devices of type syslog configured for this cluster.                        |
| `vault.audit.device.socket.udp.count`                               | The total total number of audit devices of type UDP socket configured for this cluster.                    |
| `vault.audit.device.socket.tcp.count`                               | The total total number of audit devices of type TCP socket configured for this cluster.                    |
| `vault.audit.device.socket.unix.count`                              | The total total number of audit devices of type UNIX socket configured for this cluster.                   |
| `vault.audit.exclusion.stanza.count`                                | The total number of audit exclusion stanzas in the HCL configuration for this cluster.                     |
| `vault.loadedsnapshots.manual.count`                                | The total number of manual (local) snapshots loaded for recovery.                                          |
| `vault.loadedsnapshots.cloud.google-gcs.count`                      | The total number of Google GCS snapshots loaded for recovery.                                              |
| `vault.loadedsnapshots.cloud.aws-s3.count`                          | The total number of AWS S3 snapshots loaded for recovery.                                                  |
| `vault.loadedsnapshots.cloud.azure-blob.count`                      | The total number of Azure Blob snapshots loaded for recovery.                                              |
| `vault.mfa.login.totp.count`                                        | The count of MFA configurations using the TOTP method enforced during login.                               |
| `vault.mfa.login.okta.count`                                        | The count of MFA configurations using the Okta method enforced during login.                               |
| `vault.mfa.login.pingid.count`                                      | The count of MFA configurations using the PingID method enforced during login.                             |
| `vault.mfa.login.duo.count`                                         | The count of MFA configurations using the Duo method enforced during login.                                |
| `vault.mfa.stepup.totp.count`                                       | The count of MFA configurations using the TOTP method enforced as step-up authentication.                  |
| `vault.mfa.stepup.okta.count`                                       | The count of MFA configurations using the Okta method enforced as step-up authentication.                  |
| `vault.mfa.stepup.pingid.count`                                     | The count of MFA configurations using the PingID method enforced as step-up authentication.                |
| `vault.mfa.stepup.duo.count`                                        | The count of MFA configurations using the Duo method enforced as step-up authentication.                   |
## Usage metadata list

HashiCorp collects the following product usage metadata as part of the `metadata` part of the
[JSON payload that it collects for licence utilization](/vault/docs/enterprise/license/utilization-reporting#example-payloads):

| Metadata Name         | Description                                                                 |
|-----------------------|-----------------------------------------------------------------------------|
| `replication_status`  | Replication status of this cluster, e.g. `perf-disabled,dr-disabled`        |
| `storage_type`        | Storage backend type, e.g. `raft` or `consul`                               |
| `operating_system`    | Operating system this cluster is running on.                                |
| `development_cluster` | Whether the cluster is operating as a development (non-production) cluster. |
