You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Sep 2, 2025. It is now read-only.
Copy file name to clipboardExpand all lines: gdi/opentelemetry/components/host-metrics-receiver.rst
+20-1Lines changed: 20 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -205,7 +205,26 @@ Process
205
205
mute_process_io_error: <true|false>
206
206
scrape_process_delay: <time>
207
207
208
-
If you keep getting errors related to process reading, consider setting ``mute_process_name_error``, ``mute_process_exe_error``, or ``mute_process_io_error`` to ``true``.
208
+
The following example demonstrates how to configure a process scraper that collects two metrics, in addition to the defaults, and uses a resource attribute to include the process owner in the collected data:
209
+
210
+
.. code:: yaml
211
+
212
+
receivers:
213
+
hostmetrics:
214
+
scrapers:
215
+
process:
216
+
resource_attributes:
217
+
process.owner:
218
+
enabled: true
219
+
metrics:
220
+
process.memory.usage:
221
+
enabled: true
222
+
process.disk.io:
223
+
enabled: true
224
+
225
+
For more information about enabling and disabling metrics and resource attributes using the process scraper, see :new-page:`hostmetricsreceiver/process <https://github.com/open-telemetry/opentelemetry-collector-contrib/blob/main/receiver/hostmetricsreceiver/internal/scraper/processscraper/documentation.md>` in the OpenTelemetry documentation.
226
+
227
+
If you continuously see errors related to process reading, consider setting ``mute_process_name_error``, ``mute_process_exe_error``, or ``mute_process_io_error`` to ``true``.
Copy file name to clipboardExpand all lines: logs/scp.rst
+20-5Lines changed: 20 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -101,19 +101,34 @@ In Splunk Cloud Platform, follow the instructions in the guided setup for the in
101
101
:width:100%
102
102
:alt:The Create user page in Splunk Cloud Platform where you can assign a user to the service account role.
103
103
104
+
105
+
8. Add a Workload Rule in Splunk Cloud Platform to limit Log Observer Connect searches to 5 minutes. This limit maintains a responsive experience for Log Observer users and reduces the chances that Log Observer Connect searches are queued. Follow the guidance in :new-page:`Create a Workload Rule in Splunk Web <https://docs.splunk.com/Documentation/SplunkCloud/9.2.2403/Admin/CreateWLMRules#Create_a_workload_rule_in_Splunk_Web>` and configure the rule as follows:
106
+
107
+
.. code-block:: none
108
+
109
+
Predicate: user=[your_Log_Observer_Connect_service-account_name] AND runtime>5m
110
+
Schedule: Always on
111
+
Action: Abort search
112
+
113
+
After creating the Workload Rule, it appears in Workload Management on the Workload Rules tab as follows:
114
+
115
+
.. image:: /_images/logs/WorkloadMgmt.png
116
+
:width:90%
117
+
:alt:This screenshot shows the configuration of the Workload Rule limiting Log Observer Connect searches to 5 minutes.
118
+
104
119
.. _download-certificate:
105
120
106
-
8. Secure a connection to your Splunk Cloud Platform instance in Splunk Observability Cloud. See :ref:`logs-scp-prereqs` for more information on the IPs to allow.
121
+
9. Secure a connection to your Splunk Cloud Platform instance in Splunk Observability Cloud. See :ref:`logs-scp-prereqs` for more information on the IPs to allow.
107
122
108
123
* To get help from Splunk Support, :ref:`Submit a support ticket <support-ticket>`.
109
124
110
125
* To do it yourself, add your public IPv4 address to your Splunk Cloud Platform allow list by following instructions in :new-page:`Add subnets to IP allow lists <https://docs.splunk.com/Documentation/SplunkCloud/latest/Admin/ConfigureIPAllowList#Add_subnets_to_IP_allow_lists>`.
111
126
112
-
9. Go back to the Log Observer Connect guided setup and select :guilabel:`Next`. Enter your service account username, password, and Splunk platform URL ``https://<stackname>.splunkcloud.com:8089`` to complete the guided setup.
127
+
10. Go back to the Log Observer Connect guided setup and select :guilabel:`Next`. Enter your service account username, password, and Splunk platform URL ``https://<stackname>.splunkcloud.com:8089`` to complete the guided setup.
113
128
114
-
10. Remove your IPv4 address from the IP allowlist that you added in step 8. If you are in a GCP environment, do not remove the additional GCP IP addresses that you added in step 8.
129
+
11. Remove your IPv4 address from the IP allowlist that you added in step 9. If you are in a GCP environment, do not remove the additional GCP IP addresses that you added in step 8.
115
130
116
-
11. Make sure to give each connection a unique name on the final page of the Log Observer Connect guided setup.
131
+
12. Make sure to give each connection a unique name on the final page of the Log Observer Connect guided setup.
117
132
118
133
.. note:: Manage concurrent search limits using your current strategy in Splunk Cloud Platform. All searches initiated by Log Observer Connect users go through the service account you create in Splunk Cloud Platform. For each active Log Observer Connect user, four back-end searches occur when a user performs a search in Log Observer Connect. For example, if there are three users accessing Log Observer Connect at the same time, the service account for Log Observer Connect initiates approximately 12 searches in Splunk Cloud Platform.
119
134
@@ -122,7 +137,7 @@ In Splunk Cloud Platform, follow the instructions in the guided setup for the in
If you were not able to independently secure a connection to your Splunk Cloud Platform instance in step 8 in the previous section, you may submit a support ticket from your Splunk Cloud Platform instance to do this on your behalf. Submit a ticket to Splunk Support to configure your Splunk Cloud Platform instance's IP allow list. Configuring your allow list properly opens your Splunk Cloud Platform instance management port to Log Observer Connect, which can then search your Splunk Cloud Platform instance log data. After Splunk Support prepares your Splunk Cloud Platform instance, you can securely create a connection to Log Observer Connect.
140
+
If you were not able to independently secure a connection to your Splunk Cloud Platform instance in step 9 in the previous section, you may submit a support ticket from your Splunk Cloud Platform instance to do this on your behalf. Submit a ticket to Splunk Support to configure your Splunk Cloud Platform instance's IP allow list. Configuring your allow list properly opens your Splunk Cloud Platform instance management port to Log Observer Connect, which can then search your Splunk Cloud Platform instance log data. After Splunk Support prepares your Splunk Cloud Platform instance, you can securely create a connection to Log Observer Connect.
Copy file name to clipboardExpand all lines: logs/set-up-logconnect.rst
+16-2Lines changed: 16 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -100,9 +100,23 @@ In your Splunk Enterprise search head, follow the instructions in the guided set
100
100
:width:100%
101
101
:alt:This screenshot shows the Create user page in Splunk Enterprise where you can assign a user to the service account role.
102
102
103
-
8. Obtain certificates for securing inter-Splunk communication. See :new-page:`Configure and install certificates in Splunk Enterprise for Splunk Log Observer Connect <https://quickdraw.splunk.com/redirect/?product=Observability&location=splunk.integration.third.party&version=current>` to learn how. Copy only the first certificate in the chain and paste it on the next page of the guided setup to securely connect Log Observer Connect and your Splunk Enterprise instance.
103
+
8. Add a Workload Rule in Splunk Enterprise to limit Log Observer Connect searches to 5 minutes. This limit maintains a responsive experience for Log Observer users and reduces the chances that Log Observer Connect searches are queued. Follow the guidance in :new-page:`Create a Workload Rule in Splunk Web <https://docs.splunk.com/Documentation/SplunkCloud/9.2.2403/Admin/CreateWLMRules#Create_a_workload_rule_in_Splunk_Web>` and configure the rule as follows:
104
104
105
-
9. Make sure to give each connection a unique name on the final page of the Log Observer Connect guided setup.
105
+
.. code-block:: none
106
+
107
+
Predicate: user=[your_Log_Observer_Connect_service-account_name] AND runtime>5m
108
+
Schedule: Always on
109
+
Action: Abort search
110
+
111
+
After creating the Workload Rule, it appears in Workload Management on the Workload Rules tab as follows:
112
+
113
+
.. image:: /_images/logs/WorkloadMgmt.png
114
+
:width:90%
115
+
:alt:This screenshot shows the configuration of the Workload Rule limiting Log Observer Connect searches to 5 minutes.
116
+
117
+
9. Obtain certificates for securing inter-Splunk communication. See :new-page:`Configure and install certificates in Splunk Enterprise for Splunk Log Observer Connect <https://quickdraw.splunk.com/redirect/?product=Observability&location=splunk.integration.third.party&version=current>` to learn how. Copy only the first certificate in the chain and paste it on the next page of the guided setup to securely connect Log Observer Connect and your Splunk Enterprise instance.
118
+
119
+
10. Make sure to give each connection a unique name on the final page of the Log Observer Connect guided setup.
106
120
107
121
.. note:: Manage concurrent search limits using your current strategy in Splunk Enterprise. All searches initiated by Log Observer Connect users go through the service account you create in Splunk Enterprise. For each active Log Observer Connect user, four back-end searches occur when a user performs a search in the Log Observer Connect UI. For example, if there are three concurrent users accessing the Log Observer Connect UI at the same time, the service account for Log Observer Connect initiates approximately 12 searches in Splunk Enterprise.
0 commit comments