You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Sep 2, 2025. It is now read-only.
#. Enter your API session token in the ``your-user-session-api-token-value`` field. To find or create an API session token, see :ref:`admin-api-access-tokens`.
248
248
#. Provide the name of the token you want to rotate in the ``name`` field.
249
249
#. Optionally, provide a grace period, in seconds, in the ``gracePeriod`` field.
250
+
#. Optionally, provide the seconds until your token expires in the ``secondsUntilExpiry`` field. This can be any value between 0 second and 5,676,000,000 seconds (18 years), inclusive. If left unspecified, the token remains valid for 30 days.
250
251
#. Call the API endpoint to rotate the token.
251
252
252
253
For example, the following API call rotates ``myToken`` and sets a grace period of 604800 seconds (7 days) before the previous token secret expires.
Copy file name to clipboardExpand all lines: gdi/opentelemetry/collector-kubernetes/kubernetes-config-advanced.rst
+29Lines changed: 29 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -503,3 +503,32 @@ Cluster Receiver support
503
503
The Cluster receiver is a 1-replica deployment of the OpenTelemetry Collector. Because the Kubernetes control plane can select any available node to run the cluster receiver pod (unless ``clusterReceiver.nodeSelector`` is explicitly set to pin the pod to a specific node), ``hostPath`` or ``local`` volume mounts don't work for such environments.
504
504
505
505
Data persistence is currently not applicable to the Kubernetes cluster metrics and Kubernetes events.
506
+
507
+
Monitor OpenShift infrastructure nodes
508
+
============================================
509
+
510
+
By default, the Splunk Distribution of OpenTelemetry Collector for Kubernetes doesn't collect data from OpenShift infrastructure nodes.
511
+
512
+
You can customize the Collector Helm Chart file to activate data collection from OpenShift infrastructure nodes. To do so, complete the following steps:
513
+
514
+
#. Open your values.yaml file for the Helm Chart.
515
+
#. Copy and paste the following YAML snippet into the values.yaml file:
.. note:: Monitoring OpenShift infrastructure nodes might pose a security risk depending on which method you used to create the Kubernetes environment.
Copy file name to clipboardExpand all lines: gdi/opentelemetry/components/vcenter-receiver.rst
+104-2Lines changed: 104 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,6 +7,108 @@ vCenter receiver
7
7
.. meta::
8
8
:description: The vCenter receiver supports ESXi and vCenter.
9
9
10
-
The Splunk Distribution of the OpenTelemetry Collector supports the vCenter receiver. Documentation is planned for a future release.
10
+
The vCenter receiver fetches metrics from a vCenter or ESXi host running VMware vSphere APIs.
11
11
12
-
To find information about this component in the meantime, see :new-page:`vCenter receiver <https://github.com/open-telemetry/opentelemetry-collector-contrib/tree/main/receiver/vcenterreceiver>` on GitHub.
12
+
Prerequisites
13
+
======================
14
+
15
+
This receiver supports ESXi and vCenter versions 7.0 and 8.
16
+
17
+
To retrieve data you need to assign a read-only user to vSphere with permissions to the vCenter server, cluster and all subsequent resources being monitored.
18
+
19
+
Get started
20
+
======================
21
+
22
+
Follow these steps to configure and activate the component:
23
+
24
+
1. Deploy the Splunk Distribution of the OpenTelemetry Collector to your host or container platform:
25
+
26
+
- :ref:`otel-install-linux`
27
+
- :ref:`otel-install-windows`
28
+
- :ref:`otel-install-k8s`
29
+
30
+
2. Configure the receiver creator receiver as described in the next section.
To activate the vCenter receiver in the Collector, add ``vecenter`` to the ``receivers`` section of your configuration file, as shown in the following example:
37
+
38
+
.. code:: yaml
39
+
40
+
receivers:
41
+
vcenter:
42
+
43
+
To complete the configuration, include the receiver in the ``metrics`` pipeline of the ``service`` section of your configuration file. For example:
* ``endpoint``. Endpoint to the vCenter Server or ESXi host that has the SDK path enabled.
78
+
79
+
* Use the <protocol>://<hostname> format, for example ``https://vcsa.hostname.localnet``.
80
+
81
+
The following settings are optional:
82
+
83
+
* ``collection_interval``. ``2m`` by default. This receiver collects metrics on an interval. If the vCenter is large, increase this value.
84
+
85
+
* Valid time units are ``ns``, ``us`` (or ``µs``), ``ms``, ``s``, ``m``, ``h``.
86
+
87
+
* ``initial_delay``. ``1s`` by default. Defines how long the receiver waits before starting.
88
+
89
+
* ``tls``. TLS control. By default insecure settings are rejected and certificate verification is on. Will use defaults for configtls.ClientConfig. Learn more at :new-page:`TLS Configuration Settings <https://github.com/open-telemetry/opentelemetry-collector/blob/main/config/configtls/README.md>` in GitHub.
90
+
91
+
Settings
92
+
======================
93
+
94
+
The following table shows the configuration options for the vCenter receiver:
Copy file name to clipboardExpand all lines: synthetics/test-config/private-locations.rst
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -144,17 +144,17 @@ Configuring Proxy Settings for Private Locations
144
144
145
145
In environments where direct internet access is restricted, you can route synthetic test traffic through a proxy server by configuring the following environment variables:
146
146
147
-
* HTTP_PROXY: Specifies the proxy server for HTTP traffic.
147
+
* ``HTTP_PROXY``: Specifies the proxy server for HTTP traffic.
For example, here is what a command might look like after you modify it to fit your environment:
160
160
@@ -165,15 +165,15 @@ For example, here is what a command might look like after you modify it to fit y
165
165
166
166
In this example:
167
167
168
-
HTTP_PROXY and HTTPS_PROXY are set to route traffic through a proxy at \http://172.17.0.1:1234.
168
+
``HTTP_PROXY`` and ``HTTPS_PROXY`` are set to route traffic through a proxy at ``http://172.17.0.1:1234``.
169
169
170
-
NO_PROXY is configured to bypass the proxy for local addresses and specific domains like .signalfx.com and .amazonaws.com.
170
+
``NO_PROXY`` is configured to bypass the proxy for local addresses and specific domains like .signalfx.com and .amazonaws.com.
171
171
172
172
Ensure that these variables are correctly configured to comply with your network policies. This setup allows the synthetic tests to communicate securely and efficiently in a controlled network environment.
173
173
174
174
When using runner, it's important to correctly configure the proxy settings to avoid issues with browser-based tests. The following steps should be followed when setting up their environment:
175
175
176
-
1. :strong:`Ensure Proper NO_PROXY Setup`:
176
+
1. :strong:`Ensure proper NO_PROXY setup`:
177
177
178
178
- When configuring ``NO_PROXY`` always include the following addresses:
0 commit comments