Skip to content
This repository was archived by the owner on Sep 2, 2025. It is now read-only.

Commit 1e273de

Browse files
Merge pull request #1573 from splunk/repo-sync
Pulling refs/heads/main into main
2 parents c62bb20 + 422b37c commit 1e273de

File tree

8 files changed

+82
-34
lines changed

8 files changed

+82
-34
lines changed

_includes/logs/query-logs.rst

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,7 @@
44
:width: 90%
55
:alt: The Log Observer UI is displayed.
66

7+
.. note:: To increase performance and help control cost, search jobs originating from Related Content stop running after 2 minutes of inactivity. All other search jobs stop running after fifteen minutes.
78

89
2. In the content control bar, enter a time range in the time picker if you want to see logs from a specific historical period. To select a time range, you must select :guilabel:`Infinite` from the :guilabel:`Search Records` field in step 5 below. When you select :guilabel:`150,000`, Log Observer returns only the most recent 150,000 logs regardless of the time range you select.
910

gdi/monitors-languages/java-monitor.rst

Lines changed: 9 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,20 @@
11
.. _java-monitor:
22

3-
Java metrics
4-
============
3+
Java metrics (deprecated)
4+
====================================
55

66
.. meta::
77
:description: Use this Splunk Observability Cloud integration for the Java monitor. See benefits, install, configuration, and metrics
88

9-
The Splunk Distribution of OpenTelemetry Collector uses the Smart Agent receiver with the
10-
``java-monitor`` to retrieve metrics from a Java application.
9+
.. caution::
10+
11+
This integration is deprecated and will reach End of Support on February 15th, 2025. During this period only critical security and bug fixes are provided. When End of Support is reached, the monitor will be removed and no longer be supported, and you won't be able to use it to send data to Splunk Observability Cloud.
1112

12-
This integration is available on Linux and Windows.
13+
To forward metrics from a Java application to Splunk Observability Cloud use the :ref:`Splunk Distribution of OpenTelemetry Java <get-started-java>` instead. To activate metrics collection in the OpenTelemetry Java agent, see :ref:`Activate metrics collection <enable_automatic_metric_collection>`.
14+
15+
The Splunk Distribution of the OpenTelemetry Collector uses the Smart Agent receiver with the ``java-monitor`` to retrieve metrics from a Java application.
1316

14-
.. note:: To activate metrics collection in the OpenTelemetry Java agent, see :ref:`Activate metrics collection <enable_automatic_metric_collection>`.
17+
This integration is available on Linux and Windows.
1518

1619
Benefits
1720
--------

gdi/opentelemetry/collector-how-to.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -62,7 +62,7 @@ Browse the table below to learn how to carry out common tasks with the Splunk Di
6262
* - Collect custom metrics
6363
- To send custom infrastructure and application metrics to Splunk Observability Cloud for deeper custom visibility.
6464
- Use this when instrumenting a service that isn't natively supported or when specific custom metrics are required.
65-
- :new-page:`send-custom-metrics`
65+
- :ref:`send-custom-metrics`
6666
* - Collect Prometheus metrics
6767
- To collect widely used Prometheus metrics and send them to Splunk Observability Cloud.
6868
- Use this when instrumenting a Prometheus source for monitoring.

gdi/opentelemetry/collector-windows/install-windows-msi.rst

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -66,17 +66,17 @@ Follow these steps:
6666

6767
2. Run the following command, where ``PATH_TO_MSI`` is the full path to the downloaded package. For example, ``C:\your\download\folder\splunk-otel-collector-0.4.0-amd64.msi``.
6868

69-
.. code-block:: PowerShell
69+
.. code-block:: PowerShell
7070
71-
Start-Process -Wait msiexec "/i PATH_TO_MSI /qn"
71+
Start-Process -Wait msiexec "/i PATH_TO_MSI /qn"
7272
73-
3. Configure the Collector using the environment variables listed in the table below.
73+
3. Configure the Collector using the variables listed in the table that follows:
7474

75-
.. code-block:: PowerShell
75+
.. code-block:: PowerShell
7676
77-
Start-Process -Wait msiexec "/i PATH_TO_MSI /qn SPLUNK_ACCESS_TOKEN=<my_access_token>"
77+
Start-Process -Wait msiexec "/i PATH_TO_MSI /qn SPLUNK_ACCESS_TOKEN=<my_access_token>"
7878
79-
You can use the following Splunk-specific environment variables with the MSI:
79+
Use the following installation configurations with the MSI deployment method:
8080

8181
.. list-table::
8282
:widths: 15 75 10

infrastructure/retention.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -102,4 +102,4 @@ The following table shows how long data is retained at different resolutions.
102102

103103
For more information on rollups in general, and how they apply to charts and detectors, see :ref:`rollups`.
104104

105-
.. note:: Custom events are retained in the platform for a year.
105+
.. note:: All events are retained in the platform for 12 months.

metrics-and-metadata/view-data-events.rst

Lines changed: 9 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -125,4 +125,12 @@ When you hover over an event in the Event Feed sidebar, a vertical line is shown
125125

126126
When you select an event in the Event Feed sidebar, you can see details about the event and, for events associated with alerts, an option to open the detector that generated the event. If the event is associated with a currently active alert, you'll also see an option to resolve the alert.
127127

128-
.. note:: You can also :ref:`overlay event markers <dashboard-event-overlay>` onto charts on a dashboard.
128+
.. note:: You can also :ref:`overlay event markers <dashboard-event-overlay>` onto charts on a dashboard.
129+
130+
131+
.. _events-retention:
132+
133+
Events retention in Splunk Observability Cloud
134+
=============================================================================
135+
136+
All types of events have a retention period of 12 months.

splunkplatform/unified-id/unified-identity.rst

Lines changed: 54 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -77,7 +77,7 @@ Prerequisites
7777
You must be an admin of the Splunk Cloud Platform and Splunk Observability Cloud instances that you want to pair.
7878

7979

80-
New Splunk Observability Cloud customers
80+
Set up Unified Identity for new Splunk Observability Cloud customers
8181
------------------------------------------------------------------------------------------
8282

8383
Splunk Cloud Platform customers who want to purchase Splunk Observability Cloud must take the following actions to set up Unified Identity:
@@ -87,9 +87,11 @@ Splunk Cloud Platform customers who want to purchase Splunk Observability Cloud
8787
2. Turn on token authentication to allow Splunk Observability Cloud to view your Splunk Cloud Platform logs. See :new-page:`Enable or disable token authentication <https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/EnableTokenAuth>` to learn how.
8888

8989

90-
Existing Splunk Observability Cloud customers
90+
Set up Unified Identity for existing Splunk Observability Cloud customers
9191
------------------------------------------------------------------------------------------
9292

93+
There are 2 ways you can pair your Splunk Observability Cloud and Splunk Cloud Platform organizations: using command-line interface with Admin Config Services (ACS) commands or using API endpoints. These instructions cover both ways. If you haven't installed the ACS command-line tool and want to use it, see :new-page:`Administer Splunk Cloud Platform using the ACS CLI <https://docs.splunk.com/Documentation/SplunkCloud/latest/Config/ACSCLI>`.
94+
9395
If you already have a Splunk Cloud Platform account and a Splunk Observability Cloud account, take the following actions to set up Unified Identity:
9496

9597
1. Turn on token authentication to allow Splunk Observability Cloud to view your Splunk Cloud Platform logs. See :new-page:`Enable or disable token authentication <https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/EnableTokenAuth>` to learn how.
@@ -98,33 +100,67 @@ If you already have a Splunk Cloud Platform account and a Splunk Observability C
98100

99101
.. note:: The API token must have ``admin`` privileges.
100102

101-
3. To pair orgs, open Terminal and enter the following Admin Config Services (ACS) command:
103+
3. Pair your Splunk Observability Cloud and Splunk Cloud Platform organizations:
102104

103-
.. code-block:: bash
105+
a. To pair with command-line interface, enter the following Admin Config Services (ACS) command:
106+
107+
.. code-block:: bash
104108
105-
acs observability pair --o11y-access-token "GrkvoDav1M-FNyxdONtK2Q"
109+
acs observability pair --o11y-access-token "<enter-o11y-access-token>"
110+
111+
Replace ``<enter-o11y-access-token>`` in the example above, with the user API access token you retrieved from Splunk Observability Cloud in previous step.
112+
113+
b. To pair with API endpoints, collect the following information then run the curl command:
114+
115+
i. Splunk Cloud Platform admin API access token (Create a new authentication token with an admin user. See :new-page:`Use Splunk Web to create authentication tokens <https://docs.splunk.com/Documentation/Splunk/9.3.1/Security/CreateAuthTokens>`.)
116+
117+
ii. O11y API access token (obtained it in step 2 above)
118+
119+
iii. Splunk Cloud Platform instance name (the custom subdomain for your Splunk Cloud stack)
120+
121+
Run the curl command:
122+
123+
.. code-block:: bash
106124
107-
Replace the access token, ``GrkvoDav1M-FNyxdONtK2Q`` in the example above, with the user API access token you retrieved from Splunk Observability Cloud in previous step.
125+
curl --location
126+
'https://admin.splunk.com/<enter-stack-name>/adminconfig/v2/observability/sso-pairing' \
127+
--header 'Content-Type: application/json' \
128+
--header 'Authorization: Bearer <enter-splunk-admin-api-token>' \
129+
--header 'o11y-access-token': '<enter-o11y-api-token>'
108130
109-
.. note:: If you haven't installed the ACS command-line tool, see :new-page:`Administer Splunk Cloud Platform using the ACS CLI <https://docs.splunk.com/Documentation/SplunkCloud/latest/Config/ACSCLI>`.
110131
111-
The pairing command returns a pairing id:
132+
Whether you used the command-line interface or API endpoints, the pairing command returns a pairing id:
112133

113-
.. image:: /_images/splunkplatform/pairingID.png
114-
:width: 90%
115-
:alt: This screenshot shows the response in Terminal showing the pairing id for the new pairing.
134+
.. code-block:: bash
135+
136+
"id": "<pairing-id>"
137+
138+
4. You can use the pairing id to get the current status of the pairing.
139+
140+
a. To get the status using command-line interface, run the following ACS command:
116141

117-
4. You can use the pairing id to get the current status of the pairing. To get the status, run the following ACS command:
142+
.. code-block:: bash
118143
119-
.. code-block:: bash
144+
acs observability pairing-status-by-id --pairing-id "<enter-pairing-id>" --o11y-access-token "<enter-o11y-access-token>"
120145
121-
acs observability pairing-status-by-id --pairing-id "GGPH8FPAAAA" --o11y-access-token "GrkvoDav1M-FNyxdONtK2Q"
146+
Replace the pairing id and the access token with your own values.
147+
148+
b. To get the status using API endpoints, run the following curl command with the data you obtained in step 3b:
149+
150+
.. code-block:: bash
151+
152+
curl --location --request GET
153+
'https://admin.splunk.com/<enter-stack-name>/adminconfig/v2/observability/sso-pairing/<enter-pairing-id>' \
154+
--header 'Content-Type: application/json' \
155+
--header 'Authorization: Bearer <enter-splunk-admin-api-token>'
156+
--header 'o11y-access-token': '<enter-o11y-api-token>'
122157
123-
Replace the pairing id and the access token with your own values. The system returns a status message showing whether or not the pairing was a success.
158+
5. The system returns a status message showing whether or not the pairing was a success. Statuses are SUCCESS, FAILED, or IN_PROGRESS.
124159

125-
.. image:: /_images/splunkplatform/unifiedID-pairingSuccess.png
126-
:width: 90%
127-
:alt: This screenshot shows a success status for the new pairing.
160+
.. code-block:: bash
161+
162+
"pairingId": "<pairing-id>"
163+
"status": "SUCCESS"
128164
129165
130166
Users will receive an email telling them to authenticate to Splunk Observability Cloud using the new authentication method through Splunk Cloud Platform SSO. Note that users can continue to use their previous login method. If you want to force all users to authenticate through Splunk Cloud Platform SSO, reach out to Splunk Customer Support to deactivate local login. To deactivate login through a third party identity provider, go to :strong:`Data Managemen > Available integrations` in Splunk Observability Cloud, select the appropriate integration (for example, Okta), and select :strong:`Deactivate`.

synthetics/test-config/private-locations.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -116,7 +116,7 @@ Follow these steps to limit logging:
116116

117117
Add certificates in Synthetics
118118
------------------------------------------------------
119-
Splunk Synthetic Monitoring supports injecting custom root CA certificates for API and Uptime tests running from your private locations. Client keys and certificates aren't supported at this time.
119+
Splunk Synthetic Monitoring supports injecting custom root CA certificates for Uptime tests running from your private locations. Client keys and certificates aren't supported at this time.
120120

121121
#. Create a folder called ``certs`` on your host machine and place the CA Certificate (in CRT format) in the folder.
122122

0 commit comments

Comments
 (0)