Skip to content
Get InfluxDB
Products

What is InfluxDB?

Build real-time applications for analytics, IoT, and cloud-native services in less time with less code using InfluxDB.

Find the right product

In the Cloud

InfluxDB Cloud Serverless

Fully managed, elastic, multi-tenant service

InfluxDB Cloud Dedicated

Fully managed, single-tenant service

On-Prem

InfluxDB Clustered

Self-managed database for on-prem or private cloud deployments

Solutions

InfluxDB in action

Discover the range of applications built on InfluxDB. Explore technical, industry-specific, and customer use cases.

Learn more

InfluxDB by Use Cases

Network Monitoring IoT Monitoring and Analytics SaaS Operational Monitoring
Explore more

InfluxDB by Industries

Manufacturing Telecommunications Energy and Utilities 
Explore more

InfluxDB Customers

Customers Become an InfluxDB Inventor
Explore more
Developers

Creating with InfluxDB

Access resources to help get started quickly with InfluxDB or learn about new features and capabilities.

Resources

Documentation Blog InfluxDB University 

Open source

InfluxDB OSS Telegraf Community
Pricing
Contact Us
Log In
Log in to InfluxDB Cloud 2.0 Log in to InfluxDB Enterprise Log in to InfluxDB Cloud 1.x
Get InfluxDB
Products
Find the right product

Running in the Cloud

InfluxDB Cloud Serverless

Fully managed, elastic, multi-tenant service

InfluxDB Cloud Dedicated

Fully managed, single-tenant service

On-Premises

InfluxDB Clustered

Self-managed database for on-prem or private cloud deployments

Solutions

InfluxDB by Use Cases

Network monitoring IoT Monitoring and Analytics SaaS Operational Monitoring
Explore more

InfluxDB by Industries

Manufacturing Telecommunications Energy and Utilities 
Explore more

InfluxDB Customers

Customers Become an InfluxDB Inventor
Explore more
Developers

Resources

Documentation Blog InfluxDB University 

Open source

InfluxDB OSS Telegraf Community

Pricing Contact Us
Log In
Log in to InfluxDB Cloud 2.0 Log in to InfluxDB Enterprise Log in to InfluxDB Cloud 1.x

Acceptable Use Policy

Last Updated: July 22, 2019

This Acceptable Use Policy (“AUP”) is incorporated into the Terms of Use and the InfluxDB Cloud 2.0 Services Subscription Agreement between Customer and InfluxData (the “Agreement”), as the case may be.

Customer’s services may be suspended or terminated for violation of this AUP, as further specified in the Agreement. Capitalized terms used in this AUP have the meaning given in the Agreement.

A.  Use of the Services

Customer may not:

  • Interfere or attempt to interfere in any manner with the functionality or proper working of the Services;
  • Upload to the Services or use the Services to store or transmit material in violation of third-party privacy rights;
  • Upload Personal Data to the Services without InfluxData’s express prior written consent in each such instance.
  • Upload to the Services, or use the Services to store or transmit any malware. Malware means programming (code, scripts, active content, and other software) that is designed to disrupt or deny operation, gather information that leads to loss of privacy or exploitation, or gain unauthorized access to system resources, or that otherwise exhibits abusive behavior. Malware includes computer viruses, worms, trojan horses, spyware, dishonest adware, scareware, crimeware, most rootkits, or other malicious or unwanted software or programs;
  • Use or permit the use of the Service to send unsolicited mass mailings outside its organization. The term “unsolicited mass mailings” includes all statutory or common definitions or understanding of those terms in the applicable jurisdiction, including without limitation, those set forth for “Commercial Electronic Mail Messages” under the U.S. CAN-SPAM Act
  • Interfere with or disrupt the integrity or performance of the Services or third-party data stored or processed with the Services or attempt to gain unauthorized access to the Services or their related systems or networks; or
  • Attempt to probe, scan, penetrate or test the vulnerability of an InfluxData system or network, or to circumvent, avoid or breach InfluxData’s security or authentication measures, whether by passive or intrusive techniques, or by social engineering, without InfluxData’s express prior written consent.

B.  Shared Resources

Customer may not use InfluxData systems, networks or technology in a way that unnecessarily interferes with their normal operation, or that consumes a disproportionate share of their resources. Customer agrees that InfluxData may quarantine or delete any data stored on InfluxData’s systems or networks if InfluxData reasonably believes that the data is infected with any malware, or is otherwise corrupted, and has the potential to infect or corrupt InfluxData systems, networks or technology or other customers’ data that is stored or accessed via InfluxData systems, networks or technology. Customer will comply with any written security or network access requirements that InfluxData provides to Customer in connection with its use of the Services.

C.  Other Networks

Customer must comply with the rules of any other network its accesses or participates in when using the Services.

D.  Abuse

Customer may not use InfluxData’s network or services to engage in, foster, or promote illegal, fraudulent, abusive, or irresponsible behavior, including:

  • Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures without express authorization of the owner of the system or network;
  • Monitoring data or traffic on any network or system without the express authorization of the owner of the system or network;
  • Interference with service to any user of the InfluxData or other network including mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks;
  • Use of an Internet account or computer without the owner’s authorization;
  • Collecting or using email addresses, screen names or other identifiers without the consent of the person identified (including, phishing, Internet scamming, password robbery, spidering, and harvesting);
  • Collecting or using information without the consent of the owner of the information;
  • Use of any false, misleading, or deceptive TCP-IP packet header information in an email or a newsgroup posting;
  • Use of the Services to distribute software that covertly gathers information about a user or covertly transmits information about the user; or
  • Any conduct that is likely to result in retaliation against the InfluxData network or website, or InfluxData’s employees, officers or other agents, including engaging in behavior that results in any server being the target of a denial of service attack (DoS).
  • Avoiding System Restrictions. Using manual or electronic means to avoid or circumvent any use limitations placed on a system (including but not limited to network, computer, communication, software application, or device) or the Services.

E.  Offensive Content

Customer may not publish, transmit or store on or via InfluxData’s network or equipment any content or links to any content that InfluxData reasonably believes:

  • Is obscene;
  • Contains harassing content or hate speech, or is violent, incites violence, or threatens violence;
  • Is unfair or deceptive under the consumer protection laws of any jurisdiction;
  • Is defamatory or violates a person’s privacy;
  • Creates a risk to a person’s safety or health, creates a risk to public safety or health, is contrary to applicable law, or interferes with an investigation by law enforcement;
  • Improperly exposes trade secrets or other confidential or proprietary information of another person;
  • Is intended to assist others in defeating technical copyright protections;
  • Infringes on another person’s copyright, trade or service mark, patent, or other property right, or violates any privacy right;
  • Is illegal or solicits conduct that is illegal under laws applicable to you or to InfluxData; or
  • Is otherwise malicious, fraudulent, or may result in retaliation against InfluxData by offended viewers or recipients.

F.  Other

Customer will not be entitled to any credit or other compensation for any interruptions of service resulting from AUP violations.

Text on the right

InfluxData logo with tagline

548 Market St, PMB 77953
San Francisco, California 94104


Contact Us

Products
InfluxDB
Telegraf
Pricing
Support
Use Cases
Resources
InfluxDB U
Blog
Community
Customers
Events
Glossary
Time Series Data
Time Series Database
Time Series Forecasting
Time Series Analysis
InfluxData
About
Careers
Partners
Legal
Newsroom
Contact Sales
Sign Up for the InfluxData Newsletter

© 2023 InfluxData Inc. All Rights Reserved. Sitemap

Legal Security Cookie Policy Comparison