Skip to content

Commit ab3fc96

Browse files
Merge branch 'main' into patch-2
2 parents 15fb9e2 + f9095d7 commit ab3fc96

File tree

59 files changed

+396
-1868
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

59 files changed

+396
-1868
lines changed
1.46 MB
Loading
310 KB
Loading

_images/logs/indexSelection.png

212 KB
Loading
-36 KB
Loading
141 KB
Loading

_includes/gdi/troubleshoot-zeroconfig-k8s.rst

Lines changed: 0 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -21,17 +21,6 @@ Examine logs to make sure that the operator and cert manager are working.
2121
* ``kubectl logs -l app=cainjector``
2222
* ``kubectl logs -l app=webhook``
2323

24-
Resolve certificate manager issues
25-
----------------------------------------
26-
27-
A hanging operator can indicate issues with the certificate manager.
28-
29-
* Check the logs of your cert-manager pods.
30-
* Restart the cert-manager pods.
31-
* Ensure that your cluster has only one instance of cert-manager. This includes ``certmanager``, ``certmanager-cainjector``, and ``certmanager-webhook``.
32-
33-
See the official cert manager troubleshooting guide for more information: :new-page:`https://cert-manager.io/docs/troubleshooting/`.
34-
3524
Validate certificates
3625
---------------------------
3726

_includes/logs/query-logs.rst

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,13 @@
88

99
2. In the content control bar, enter a time range in the time picker if you want to see logs from a specific historical period. To select a time range, you must select :guilabel:`Unlimited` from the :guilabel:`Search Records` field in step 5 below. When you select :guilabel:`150,000`, Log Observer returns only the most recent 150,000 logs regardless of the time range you select.
1010

11-
3. Select :guilabel:`Index` next to :guilabel:`Saved Queries`, then select the indexes you want to query. When you do not select an index, Log Observer runs your query on all indexes to which you have access. If you want to search your Splunk platform (Splunk Cloud Platform or Splunk Enterprise) data, select the integration for the appropriate Splunk platform instance first, then select which index you want to query in Log Observer. You can query indexes from only one Splunk platform instance or Splunk Observability Cloud instance at a time. You can query Splunk platform indexes only if you have the appropriate role and permissions.
11+
3. Select :guilabel:`Index` next to :guilabel:`Saved Queries`. In the pop-up window, first select a Splunk platform (Splunk Cloud Platform or Splunk Enterprise) connection in the :guilabel:`Connection selection` section. Then, in the :guilabel:`Index selection` section, select which index you want to query in Log Observer Connect.
12+
13+
.. image:: /_images/logs/indexSelection.png
14+
:width: 90%
15+
:alt: The Log Observer index selection pop-up is displayed.
16+
17+
.. note:: You can query indexes from only one Splunk platform instance at a time. You can query Splunk platform indexes only if you have the appropriate role and permissions in Splunk platform.
1218

1319
4. In the content control bar next to the index picker, select :guilabel:`Add Filter`. Select the :guilabel:`Keyword` tab to search on a keyword or phrase. Select the :guilabel:`Fields` tab to search on a field. Then press Enter. To continue adding keywords or fields to the search, select :guilabel:`Add Filter` again.
1420

@@ -18,9 +24,11 @@
1824

1925
7. Select :guilabel:`Run search`.
2026

21-
8. Review the top values for your query on the the :guilabel:`Fields` panel on right. This list includes the count of each value in the log records. To include log records with a particular value, select the field name, then select ``=``. To exclude log records with a particular value from your results, select the field name, then select ``!=``. To see the full list of values and distribution for this field, select :guilabel:`Explore all values`.
27+
8. [Optional] If you want to stop the current search, select :guilabel:`Cancel search`. Partial results do not display. To continue your search, select :guilabel:`Run search` again.
28+
29+
9. Review the top values for your query on the the :guilabel:`Fields` panel on right. This list includes the count of each value in the log records. To include log records with a particular value, select the field name, then select ``=``. To exclude log records with a particular value from your results, select the field name, then select ``!=``. To see the full list of values and distribution for this field, select :guilabel:`Explore all values`.
2230

23-
9. Optionally, if you are viewing Splunk platform data, you can open your query results in the Splunk platform and use SPL to further query the resulting logs. You must have an account in Splunk platform. To open the log results in the Splunk platform, select the :guilabel:`Open in Splunk platform` icon at the top of the Logs table.
31+
10. [Optional] If you are viewing Splunk platform data, you can open your query results in the Splunk platform and use SPL to further query the resulting logs. You must have an account in Splunk platform. To open the log results in the Splunk platform, select the :guilabel:`Open in Splunk platform` icon at the top of the Logs table.
2432

2533
.. image:: /_images/logs/lo-openinsplunk.png
2634
:width: 90%
Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,10 @@
11
The Collector supports the following Linux distributions and versions:
22

33
* Amazon Linux: 2, 2023. Log collection with Fluentd is not currently supported for Amazon Linux 2023.
4-
* CentOS, Red Hat, or Oracle: 7, 8, 9
5-
* Debian: 9, 10, 11
4+
* CentOS: 7, 8, 9
5+
* Red Hat: 7, 8, 9
6+
* Oracle: 8, 9
7+
* Debian: 11, 12
68
* SUSE: 12, 15 for version 0.34.0 or higher. Log collection with Fluentd is not currently supported.
79
* Ubuntu: 16.04, 18.04, 20.04, 22.04, and 24.04
810
* Rocky Linux: 8, 9

admin/authentication/SSO/sso.rst

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,26 @@ Give your login service integration a name that your users recognize. On your cu
7575
this name appears in the button your users select to sign in. For example, use the name "Log in with Okta"
7676
for an Okta login service integration.
7777

78+
.. _default-sso-role:
79+
80+
.. raw:: html
81+
82+
<embed>
83+
<h2>Set up default SSO role</h2>
84+
</embed>
85+
86+
87+
When you set up SSO, the default role for a user signing in to Splunk Observability Cloud through SSO is the :guilabel:`power` role. You can change the default SSO role to any of the available roles in Splunk Observability Cloud. These are :guilabel:`admin`, :guilabel:`power`, :guilabel:`usage`, and :guilabel:`read_only`. To learn more about roles, see :ref:`roles-and-capabilities`.
88+
89+
.. note:: Changing the default SSO role affects only new SSO users. If a user already has an existing role defined by the previous default SSO role, you must change it manually. To change a user's role, see :ref:`assign-role-existing`.
90+
91+
To change the default SSO role, do the following:
92+
93+
1. Go to :guilabel:`Settings` then select :guilabel:`General Settings`.
94+
95+
2. In the :guilabel:`User Management` section, set a default role for SSO login by selecting a role from the drop-down list. The drop-down list defaults to the :guilabel:`power` role. The role you select becomes the role of any new user logging in through an SSO service. You can return to :guilabel:`General Settings` and update the default role for SSO login at any time.
96+
97+
7898
.. _multiple-integrations-sso:
7999

80100
.. raw:: html

admin/references/system-limits/sys-limits-infra.rst

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -72,6 +72,9 @@ Main system limits
7272
* - :ref:`number-of-input-mts-per-job`
7373
- 250,000
7474

75+
.. note:: In most cases, you should use the default system limits. To adjust the limit values for your org, contact Splunk Observability Cloud Support. See :ref:`support`.
76+
77+
7578
.. _charts-detectors-and-signalflow-limits:
7679

7780
Charts, detectors, and SignalFlow limits

0 commit comments

Comments
 (0)