You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Splunk Observability Cloud uses OpenTelemetry to correlate telemetry types. To enable this ability, your telemetry field names or metadata key names must exactly match the metadata key names used by both OpenTelemetry and Splunk Observability Cloud.
76
+
Splunk Observability Cloud uses OpenTelemetry to correlate telemetry types. To do this, your telemetry field names or metadata key names must exactly match the metadata key names used by both OpenTelemetry and Splunk Observability Cloud.
77
77
78
78
Related Content works out-of-the-box when you deploy the Splunk Distribution of the OpenTelemetry Collector with its default configuration to send your telemetry data to Splunk Observability Cloud. With the default configuration the Collector automatically maps your metadata key names correctly. To learn more about the Collector, see :ref:`otel-intro`.
79
79
@@ -108,7 +108,7 @@ When the field names in APM and Log Observer match, the trace and the log with t
If you're using the Splunk Distribution of the OpenTelemetry Collector, another distribution of the Collector, or the :ref:`upstream Collector <using-upstream-otel>` and want to ensure Related Content in Splunk Observability Cloud behaves correctly, verify that the SignalFx exporter is included in your configuration. This exporter aggregates the metrics from the ``hostmetrics`` receiver and must be enabled for the ``metrics`` and ``traces`` pipelines.
111
+
If you're using the Splunk Distribution of the OpenTelemetry Collector, any other distribution of the Collector, or the :ref:`upstream Collector <using-upstream-otel>` and want to ensure Related Content in Splunk Observability Cloud behaves correctly, verify that the SignalFx exporter is included in your configuration. This exporter aggregates the metrics from the ``hostmetrics`` receiver and must be enabled for the ``metrics`` and ``traces`` pipelines.
112
112
113
113
The Collector uses the correlation flag of the SignalFx exporter to make relevant API calls to correlate your spans with the infrastructure metrics. This flag is enabled by default. To adjust the correlation option further, see the SignalFx exporter's options at :ref:`signalfx-exporter-settings`.
114
114
@@ -124,10 +124,12 @@ The following sections list the metadata key names required to enable Related Co
The following APM span tags are required to enable Related Content:
127
+
To enable Related Content for APM use one of these span tags:
128
128
129
129
- ``service.name``
130
-
- ``deployment.environment``
130
+
- ``trace_id``
131
+
132
+
Optionally, you can also use ``deployment.environment`` with ``service.name``.
131
133
132
134
The default configuration of the Splunk Distribution of the OpenTelemetry Collector already provides these span tags. To ensure full functionality of Related Content, do not change any of the metadata key names or span tags provided by the Splunk OTel Collector.
133
135
@@ -154,39 +156,58 @@ For example, consider a scenario in which Related Content needs to return data f
If you're using the default configuration of the Splunk Distribution of the OpenTelemetry Collector for Kubernetes, the required Infrastructure Monitoring metadata is provided. See more at :ref:`otel-install-k8s`.
168
170
169
171
If you're using other distributions of the OpenTelemetry Collector or non-default configurations of the Splunk Distribution to collect infrastructure data, Related Content won't work out of the box.
The following key names are required to enable Related Content for Log Observer:
178
+
To enable Related Content for logs use one of these fields:
179
179
180
-
- ``service.name``
181
-
- ``deployment.environment``
182
180
- ``host.name``
183
-
- ``trace_id``
181
+
- ``service.name``
184
182
- ``span_id``
183
+
- ``trace_id``
185
184
186
185
To ensure full functionality of both Log Observer and Related Content, verify that your log events fields are correctly mapped. Correct log field mappings enable built-in log filtering, embed logs in APM and Infrastructure Monitoring functionality, and enable fast searches as well as the Related Content bar.
187
186
188
187
If the key names in the preceding list use different names in your log fields, remap them to the key names listed here. For example, if you don't see values for :strong:`host.name` in the Log Observer UI, check to see whether your logs use a different field name, such as :strong:`host_name`. If your logs do not contain the default field names exactly as they appear in the preceding list, remap your logs using one of the methods in the following section.
The Splunk Distribution of the OpenTelemetry Collector injects the following fields into your Kubernetes logs. Do not modify them if you want to use Related Content.
195
+
196
+
- ``k8s.cluster.name``
197
+
- ``k8s.node.name``
198
+
- ``k8s.pod.name``
199
+
- ``container.id``
200
+
- ``k8s.namespace.name``
201
+
- ``kubernetes.workload.name``
202
+
203
+
Use one of these tag combinations to enable Related Content:
The Splunk Distribution of the OpenTelemetry Collector injects the following fields into your Kubernetes logs. Do not modify them if you want to use Related Content.
225
-
226
-
- ``k8s.cluster.name``
227
-
- ``k8s.node.name``
228
-
- ``k8s.pod.name``
229
-
- ``container.id``
230
-
- ``k8s.namespace.name``
231
-
- ``kubernetes.workload.name``
232
-
233
-
Learn more about the Collector for Kubernetes at :ref:`collector-kubernetes-intro`.
0 commit comments