You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -288,7 +288,7 @@ This app uses the [Findings](https://cloud.google.com/security-command-center/do
288
288
<details>
289
289
<summary>Vulnerability</summary>
290
290
291
-
```json
291
+
```json
292
292
{
293
293
"message": {
294
294
"data": {
@@ -468,8 +468,8 @@ This section describes the Sumo Logic pipeline for collecting the data from Goog
468
468
Follow the steps below to integrate the Google Cloud Security Command Center (SCC) app:
469
469
470
470
1. Enable the [Security Command Center (SCC)](https://cloud.google.com/security-command-center/docs/activate-scc-overview) at the GCP console.
471
-
1. In Sumo Logic, [configure the Google Cloud Platform source](https://help.sumologic.com/docs/send-data/hosted-collectors/google-source/google-cloud-platform-source/#configure-agoogle-cloud-platform-source).
472
-
1. In the GCP console, configure a Pub/Sub Topic for [GCP](https://help.sumologic.com/docs/send-data/hosted-collectors/google-source/google-cloud-platform-source/#configure-a-pubsub-topicfor-gcp). This topic will be used to send SCC findings from GCP to Sumo Logic.
471
+
1. In Sumo Logic, [configure the Google Cloud Platform source](/docs/send-data/hosted-collectors/google-source/google-cloud-platform-source/#configure-agoogle-cloud-platform-source).
472
+
1. In the GCP console, configure a Pub/Sub Topic for [GCP](/docs/send-data/hosted-collectors/google-source/google-cloud-platform-source/#configure-a-pubsub-topicfor-gcp). This topic will be used to send SCC findings from GCP to Sumo Logic.
473
473
1. In the SCC blade of the GCP console, click **Continuous Exports**. <br/><img src={useBaseUrl('https://sumologic-app-data-v2.s3.us-east-1.amazonaws.com/dashboards/Google+Cloud+-+Security+Command+Center/step4.png')} alt="Google Cloud Storage dashboards" width="500" />
474
474
1. In the GCP console, export the findings from SCC to the [Pub/Sub Topic](https://cloud.google.com/security-command-center/docs/how-to-export-data?_gl=1*1dt4zsw*_ga*ODU1MTc4OTQ1LjE3Mzg3ODM5NzI.*_ga_WH2QY8WWF5*czE3NDY2Mzc3MzQkbzMkZzEkdDE3NDY2MzgxNDUkajYwJGwwJGgw#configure-pubsub-exports) created above.
Copy file name to clipboardExpand all lines: docs/integrations/sumo-apps/opentelemetry-collector-insights.md
+19-21Lines changed: 19 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -31,9 +31,7 @@ Following are the [fields](/docs/manage/fields/) which will be created as part o
31
31
32
32
Before configuring the OTEL Collector integration, ensure you have the following prerequisites in place:
33
33
34
-
1.**Sumo Logic OTLP Source**: You need to create an OTLP source in your Sumo Logic hosted collector. The OTLP source will provide the endpoint URL that the OTEL Collector will use to send telemetry data.
35
-
36
-
**Documentation**: [Creating a Sumo Logic OTLP Source](https://help.sumologic.com/docs/send-data/hosted-collectors/http-source/otlp/)
34
+
1.**Sumo Logic OTLP Source**. You need to create an OTLP source in your Sumo Logic hosted collector. The OTLP source will provide the endpoint URL that the OTEL Collector will use to send telemetry data. Learn more at [Creating a Sumo Logic OTLP Source](/docs/send-data/hosted-collectors/http-source/otlp/).
37
35
38
36
### For metrics collection
39
37
@@ -77,7 +75,7 @@ In this step, you will configure the OpenTelemetry Collector's built-in telemetr
77
75
78
76
Below are the inputs required:
79
77
80
-
-**OTLP Endpoint**: Your Sumo Logic OTLP endpoint URL.
78
+
-**OTLP Endpoint**. Your Sumo Logic OTLP endpoint URL.
81
79
82
80
83
81
```yaml
@@ -107,13 +105,13 @@ service:
107
105
deployment.environment: ${DEPLOYMENT_ENVIRONMENT}
108
106
```
109
107
110
-
You can add any custom fields which you want to tag along with the data ingested in Sumo.
108
+
You can add any custom fields which you want to tag along with the data ingested in Sumo Logic.
111
109
112
110
import EnvVar from '../../reuse/apps/opentelemetry/env-var-required.md';
@@ -137,31 +135,31 @@ import LogsIntro from '../../reuse/apps/opentelemetry/send-logs-intro.md';
137
135
138
136
1. Add the telemetry configuration to your existing collector configuration file in `/etc/otelcol-sumo/conf.d/` or directly in the main configuration file.
139
137
2. Place Env file in the following directory:
140
-
```sh
141
-
/etc/otelcol-sumo/env/
142
-
```
138
+
```sh
139
+
/etc/otelcol-sumo/env/
140
+
```
143
141
3. Restart the collector using:
144
-
```sh
145
-
sudo systemctl restart otelcol-sumo
146
-
```
142
+
```sh
143
+
sudo systemctl restart otelcol-sumo
144
+
```
147
145
148
146
</TabItem>
149
147
<TabItem value="Windows">
150
148
151
149
1. Add the telemetry configuration to your existing collector configuration file in `C:\ProgramData\Sumo Logic\OpenTelemetry Collector\config\conf.d` or the main configuration file.
152
150
2. Restart the collector using:
153
-
```sh
154
-
Restart-Service -Name OtelcolSumo
155
-
```
151
+
```sh
152
+
Restart-Service -Name OtelcolSumo
153
+
```
156
154
157
155
</TabItem>
158
156
<TabItem value="macOS">
159
157
160
158
1. Add the telemetry configuration to your existing collector configuration file in `/etc/otelcol-sumo/conf.d/` or the main configuration file.
@@ -387,7 +385,7 @@ Monitor the `otelcol_exporter_queue_size` and `otelcol_exporter_queue_capacity`
387
385
388
386
Watch for logs containing "Dropping data because sending_queue is full" and monitor failed enqueue metrics:
389
387
- `otelcol_exporter_enqueue_failed_spans`
390
-
- `otelcol_exporter_enqueue_failed_metric_points`
388
+
- `otelcol_exporter_enqueue_failed_metric_points`
391
389
- `otelcol_exporter_enqueue_failed_log_records`
392
390
393
391
### Accessing collector metrics directly
@@ -419,4 +417,4 @@ import CreateMonitors from '../../reuse/apps/create-monitors.md';
419
417
| `OpenTelemetry Collector Insights - Collector Instance is Down` | This alert fires when a Collector instance stops sending telemetry for more than 10 minutes, indicating it is down or has a connectivity issue. | Missing Data | Data Found |
420
418
| `OpenTelemetry Collector Insights - Exporter Queue Nearing Capacity` | This alert fires when an exporter's sending queue is over 90% full. This is a strong leading indicator of back pressure and imminent data loss. | Count > = 90 | Count < 90 |
421
419
| `OpenTelemetry Collector Insights - High Memory Usage (RSS)` | This alert fires when a Collector's memory usage (RSS) exceeds 2GB. This could be an early indicator of a memory leak or an under-provisioned host. | Count > 2000000000 | Count < = 2000000000 |
422
-
| `OpenTelemetry Collector Insights - High Metadata Cardinality` | This alert fires when the batch processor is handling more than 1000 unique combinations of metadata. This is a known cause of performance degradation, high CPU, and high memory usage. | Count > 1000 | Count < = 1000 |
420
+
| `OpenTelemetry Collector Insights - High Metadata Cardinality` | This alert fires when the batch processor is handling more than 1000 unique combinations of metadata. This is a known cause of performance degradation, high CPU, and high memory usage. | Count > 1000 | Count < = 1000 |
0 commit comments