You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Sep 2, 2025. It is now read-only.
Copy file name to clipboardExpand all lines: _includes/logs/query-logs.rst
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,6 +4,7 @@
4
4
:width:90%
5
5
:alt:The Log Observer UI is displayed.
6
6
7
+
.. note:: To increase performance and help control cost, search jobs originating from Related Content stop running after 2 minutes of inactivity. All other search jobs stop running after fifteen minutes.
7
8
8
9
2. In the content control bar, enter a time range in the time picker if you want to see logs from a specific historical period. To select a time range, you must select :guilabel:`Infinite` from the :guilabel:`Search Records` field in step 5 below. When you select :guilabel:`150,000`, Log Observer returns only the most recent 150,000 logs regardless of the time range you select.
Copy file name to clipboardExpand all lines: gdi/monitors-languages/java-monitor.rst
+9-6Lines changed: 9 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,17 +1,20 @@
1
1
.. _java-monitor:
2
2
3
-
Java metrics
4
-
============
3
+
Java metrics (deprecated)
4
+
====================================
5
5
6
6
.. meta::
7
7
:description: Use this Splunk Observability Cloud integration for the Java monitor. See benefits, install, configuration, and metrics
8
8
9
-
The Splunk Distribution of OpenTelemetry Collector uses the Smart Agent receiver with the
10
-
``java-monitor`` to retrieve metrics from a Java application.
9
+
.. caution::
10
+
11
+
This integration is deprecated and will reach End of Support on February 15th, 2025. During this period only critical security and bug fixes are provided. When End of Support is reached, the monitor will be removed and no longer be supported, and you won't be able to use it to send data to Splunk Observability Cloud.
11
12
12
-
This integration is available on Linux and Windows.
13
+
To forward metrics from a Java application to Splunk Observability Cloud use the :ref:`Splunk Distribution of OpenTelemetry Java <get-started-java>` instead. To activate metrics collection in the OpenTelemetry Java agent, see :ref:`Activate metrics collection <enable_automatic_metric_collection>`.
14
+
15
+
The Splunk Distribution of the OpenTelemetry Collector uses the Smart Agent receiver with the ``java-monitor`` to retrieve metrics from a Java application.
13
16
14
-
.. note:: To activate metrics collection in the OpenTelemetry Java agent, see :ref:`Activate metrics collection <enable_automatic_metric_collection>`.
17
+
This integration is available on Linux and Windows.
Copy file name to clipboardExpand all lines: gdi/opentelemetry/collector-windows/install-windows-msi.rst
+6-6Lines changed: 6 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -66,17 +66,17 @@ Follow these steps:
66
66
67
67
2. Run the following command, where ``PATH_TO_MSI`` is the full path to the downloaded package. For example, ``C:\your\download\folder\splunk-otel-collector-0.4.0-amd64.msi``.
68
68
69
-
.. code-block:: PowerShell
69
+
.. code-block:: PowerShell
70
70
71
-
Start-Process-Wait msiexec "/i PATH_TO_MSI /qn"
71
+
Start-Process-Wait msiexec "/i PATH_TO_MSI /qn"
72
72
73
-
3. Configure the Collector using the environment variables listed in the table below.
73
+
3. Configure the Collector using the variables listed in the table that follows:
Copy file name to clipboardExpand all lines: metrics-and-metadata/view-data-events.rst
+9-1Lines changed: 9 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -125,4 +125,12 @@ When you hover over an event in the Event Feed sidebar, a vertical line is shown
125
125
126
126
When you select an event in the Event Feed sidebar, you can see details about the event and, for events associated with alerts, an option to open the detector that generated the event. If the event is associated with a currently active alert, you'll also see an option to resolve the alert.
127
127
128
-
.. note:: You can also :ref:`overlay event markers <dashboard-event-overlay>` onto charts on a dashboard.
128
+
.. note:: You can also :ref:`overlay event markers <dashboard-event-overlay>` onto charts on a dashboard.
Splunk Cloud Platform customers who want to purchase Splunk Observability Cloud must take the following actions to set up Unified Identity:
@@ -87,9 +87,11 @@ Splunk Cloud Platform customers who want to purchase Splunk Observability Cloud
87
87
2. Turn on token authentication to allow Splunk Observability Cloud to view your Splunk Cloud Platform logs. See :new-page:`Enable or disable token authentication <https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/EnableTokenAuth>` to learn how.
88
88
89
89
90
-
Existing Splunk Observability Cloud customers
90
+
Set up Unified Identity for existing Splunk Observability Cloud customers
There are 2 ways you can pair your Splunk Observability Cloud and Splunk Cloud Platform organizations: using command-line interface with Admin Config Services (ACS) commands or using API endpoints. These instructions cover both ways. If you haven't installed the ACS command-line tool and want to use it, see :new-page:`Administer Splunk Cloud Platform using the ACS CLI <https://docs.splunk.com/Documentation/SplunkCloud/latest/Config/ACSCLI>`.
94
+
93
95
If you already have a Splunk Cloud Platform account and a Splunk Observability Cloud account, take the following actions to set up Unified Identity:
94
96
95
97
1. Turn on token authentication to allow Splunk Observability Cloud to view your Splunk Cloud Platform logs. See :new-page:`Enable or disable token authentication <https://docs.splunk.com/Documentation/SplunkCloud/latest/Security/EnableTokenAuth>` to learn how.
@@ -98,33 +100,67 @@ If you already have a Splunk Cloud Platform account and a Splunk Observability C
98
100
99
101
.. note:: The API token must have ``admin`` privileges.
100
102
101
-
3. To pair orgs, open Terminal and enter the following Admin Config Services (ACS) command:
103
+
3. Pair your Splunk Observability Cloud and Splunk Cloud Platform organizations:
102
104
103
-
.. code-block:: bash
105
+
a. To pair with command-line interface, enter the following Admin Config Services (ACS) command:
Replace ``<enter-o11y-access-token>`` in the example above, with the user API access token you retrieved from Splunk Observability Cloud in previous step.
112
+
113
+
b. To pair with API endpoints, collect the following information then run the curl command:
114
+
115
+
i. Splunk Cloud Platform admin API access token (Create a new authentication token with an admin user. See :new-page:`Use Splunk Web to create authentication tokens <https://docs.splunk.com/Documentation/Splunk/9.3.1/Security/CreateAuthTokens>`.)
116
+
117
+
ii. O11y API access token (obtained it in step 2 above)
118
+
119
+
iii. Splunk Cloud Platform instance name (the custom subdomain for your Splunk Cloud stack)
120
+
121
+
Run the curl command:
122
+
123
+
.. code-block:: bash
106
124
107
-
Replace the access token, ``GrkvoDav1M-FNyxdONtK2Q`` in the example above, with the user API access token you retrieved from Splunk Observability Cloud in previous step.
.. note:: If you haven't installed the ACS command-line tool, see :new-page:`Administer Splunk Cloud Platform using the ACS CLI <https://docs.splunk.com/Documentation/SplunkCloud/latest/Config/ACSCLI>`.
110
131
111
-
The pairing command returns a pairing id:
132
+
Whether you used the command-line interface or API endpoints, the pairing command returns a pairing id:
112
133
113
-
.. image:: /_images/splunkplatform/pairingID.png
114
-
:width:90%
115
-
:alt:This screenshot shows the response in Terminal showing the pairing id for the new pairing.
134
+
.. code-block:: bash
135
+
136
+
"id": "<pairing-id>"
137
+
138
+
4. You can use the pairing id to get the current status of the pairing.
139
+
140
+
a. To get the status using command-line interface, run the following ACS command:
116
141
117
-
4. You can use the pairing id to get the current status of the pairing. To get the status, run the following ACS command:
Replace the pairing id and the access token with your own values. The system returns a status message showing whether or not the pairing was a success.
158
+
5. The system returns a status message showing whether or not the pairing was a success. Statuses are SUCCESS, FAILED, or IN_PROGRESS.
:alt:This screenshot shows a success status for the new pairing.
160
+
.. code-block:: bash
161
+
162
+
"pairingId": "<pairing-id>"
163
+
"status": "SUCCESS"
128
164
129
165
130
166
Users will receive an email telling them to authenticate to Splunk Observability Cloud using the new authentication method through Splunk Cloud Platform SSO. Note that users can continue to use their previous login method. If you want to force all users to authenticate through Splunk Cloud Platform SSO, reach out to Splunk Customer Support to deactivate local login. To deactivate login through a third party identity provider, go to :strong:`Data Managemen > Available integrations` in Splunk Observability Cloud, select the appropriate integration (for example, Okta), and select :strong:`Deactivate`.
Splunk Synthetic Monitoring supports injecting custom root CA certificates for API and Uptime tests running from your private locations. Client keys and certificates aren't supported at this time.
119
+
Splunk Synthetic Monitoring supports injecting custom root CA certificates for Uptime tests running from your private locations. Client keys and certificates aren't supported at this time.
120
120
121
121
#. Create a folder called ``certs`` on your host machine and place the CA Certificate (in CRT format) in the folder.
0 commit comments