Skip to content
This repository was archived by the owner on Sep 2, 2025. It is now read-only.

Commit 7a1376d

Browse files
author
Tracey Carter
committed
Merge branch 'main' into tcarter-RelatedContent-Logs
2 parents 7f5894b + 4a08836 commit 7a1376d

File tree

91 files changed

+13077
-8612
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

91 files changed

+13077
-8612
lines changed

_images/collector/imagetest.png

Loading

admin/authentication/allow-services.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ Ensure that you give the proxy the ability to resolve the network names and make
2828
Use the Splunk Distribution of the OpenTelemetry Collector
2929
=======================================================================
3030

31-
Use the :new-page:`Splunk Distribution of OpenTelemetry Collector <https://docs.splunk.com/Observability/gdi/opentelemetry/deployment-modes.html>` in data forwarding (gateway) mode. You can forward metrics locally to the Splunk Distribution of OpenTelemetry Collector, which serves as your local store-and-forward service for telemetry.
31+
The :new-page:`Splunk Distribution of OpenTelemetry Collector <https://docs.splunk.com/Observability/gdi/opentelemetry/deployment-modes.html>` supports proxies. You can configure proxies on each collector, or more typically, you would configure a collector in data forwarding (gateway) mode. In the gateway mode, you only need to configure the gateway collectors with the proxy settings; all other collectors can simply send data to the gateway collector.
3232

3333
Ensure that you give the Splunk Distribution of OpenTelemetry Collector the ability to resolve the network names and make outbound HTTPS network connections to the URLs listed in :ref:`allow-urls` or the domains listed in :ref:`allow-domains`. Verify also the list of :ref:`exposed ports and endpoints <otel-exposed-endpoints>`.
3434

admin/authentication/authentication-tokens/manage-usage.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,7 @@ To set token limits:
166166

167167
#. If you chose a team as a notification recipient and you want to have alerts display on the team's Dashboards page, you must link the detector you created in the previous step to the team. To do this:
168168

169-
#. Access the left navigation panel and select :menuselection:`Alerts & Detectors`.
169+
#. Access the left navigation panel and select :menuselection:`Detectors & SLOs`.
170170
#. Select the :guilabel:`Detectors` tab.
171171
#. Search for the detector you created. By default, the detector's name includes the name of the access token it was created for. So, an easy way to find the detector is to search for the name of the access token.
172172
#. Open the detector's action menu (|more|) and select :guilabel:`Links to Teams`. Select a team.

alerts-detectors-notifications/alerts-and-detectors/autodetect/autodetect-customize.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,7 @@ To customize an AutoDetect detector you must copy it first, because AutoDetect d
1111

1212
To customize a copy of an AutoDetect detector, do the following:
1313

14-
#. In the navigation menu, select :menuselection:`Alerts & Detectors`.
14+
#. In the navigation menu, select :guilabel:`Detectors & SLOs`.
1515
#. Select the :strong:`Detectors` tab.
1616
#. In the search field, enter the name of the detector you want to customize.
1717

alerts-detectors-notifications/alerts-and-detectors/autodetect/autodetect-intro.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ See the following topics for more information on how to collect the required dat
2222
- :new-page-ref:`kafka`
2323
- :ref:`get-started-k8s`
2424

25-
After you've set up the supported integrations, AutoDetect alerts and detectors automatically appear on the :strong:`Alerts & Detectors` page and the corresponding dashboards and navigators for your integrations.
25+
After you've set up the supported integrations, AutoDetect alerts and detectors automatically appear on the :guilabel:`Detectors & SLOs` page and the corresponding dashboards and navigators for your integrations.
2626

2727
.. note:: By default, you aren't subscribed to receive notifications from AutoDetect. To learn how to subscribe to AutoDetect notifications, see :ref:`autodetect-subscribe-mute-turn-off`.
2828

alerts-detectors-notifications/alerts-and-detectors/autodetect/autodetect-subscribe-mute-turn-off.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ Turn off AutoDetect detectors
2424

2525
To turn off an AutoDetect detector, do the following:
2626

27-
#. In the navigation menu, select :menuselection:`Alerts & Detectors`.
27+
#. In the navigation menu, select :guilabel:`Detectors & SLOs`.
2828
#. Select the :strong:`Detectors` tab.
2929
#. In the search field, enter the name of the detector you want to turn off.
3030

alerts-detectors-notifications/alerts-and-detectors/autodetect/autodetect-view.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,11 @@ View AutoDetect alerts and detectors
66
.. meta::
77
:description: Splunk Observability Cloud automatically creates alerts and detectors when you have supported integrations configured. Learn how to use and customize with AutoDetect alerts and detectors.
88

9-
You can view AutoDetect detectors on the :guilabel:`Alerts & Detectors` page, in a navigator or dashboard for a service, or in a chart.
9+
You can view AutoDetect detectors on the :guilabel:`Detectors & SLOs` page, in a navigator or dashboard for a service, or in a chart.
1010

1111
To view a complete list of all available AutoDetect alerts and detectors in your organization, do the following:
1212

13-
#. From the Splunk Observability Cloud home page, go to the :guilabel:`Alerts & Detectors` page.
13+
#. From the Splunk Observability Cloud home page, go to the :guilabel:`Detectors & SLOs` page.
1414
#. Select the :guilabel:`Active Alerts` or :guilabel:`Detectors` tab. Alerts genereated by AutoDetect detectors have an :guilabel:`Auto` badge.
1515
#. You can also select :guilabel:`AutoDetect` or :guilabel:`Customized AutoDetect` in the filter on the :guilabel:`Active Alerts` or :guilabel:`Detectors` tabs.
1616

alerts-detectors-notifications/alerts-and-detectors/create-detectors-for-alerts.rst

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ Detectors are made up of alert rules. When you create an alert rule you can sele
1313

1414
When a detector determines that the conditions for a rule are met, it triggers an alert, creates an event, and sends notifications, if specified. Detectors can send notifications through email, as well as through other systems, such as Slack, or by using a webhook. To learn more, see :ref:`admin-notifs-index`.
1515

16-
You can find active alerts, existing detectors, and muting rules under :guilabel:`Alerts & Detectors`. You can also find alerts in the Events Feed, available within any dashboard.
16+
You can find active alerts, existing detectors, and muting rules under :guilabel:`Detectors & SLOs`. You can also find alerts in the Events Feed, available within any dashboard.
1717

1818
.. note:: This topic covers Infrastructure and Custom Metrics detectors. You can create a Splunk APM detector to monitor request rates, error rates, and latency for your service. To learn more about Splunk APM detectors, visit :ref:`apm-alerts`.
1919

@@ -45,7 +45,7 @@ There are several ways to create a detector.
4545
Clone an existing detector
4646
-------------------------------------------------------------------
4747

48-
You can see a list of existing detectors on the :guilabel:`Detectors` tab under Alerts & Detectors.
48+
You can see a list of existing detectors on the :guilabel:`Detectors` tab under :guilabel:`Detectors & SLOs`.
4949

5050
1. Look for a detector that is similar to the detector you want to create.
5151
2. Select the detector.
@@ -73,7 +73,7 @@ After you create a detector from a chart, a :ref:`link to the new detector<link-
7373
Create a detector from scratch
7474
-------------------------------------------------------------------
7575

76-
To create a new detector for Infrastructure or Custom Metrics from scratch, you can either select :guilabel:`New Detector` under Alerts & Detectors, or select :menuselection:`Custom Detector` from the create menu on the navigation bar. Enter a detector name and then select :guilabel:`Create Alert Rule` to proceed to the alert rule builder. For instructions on building the rule, see :ref:`build-rules`.
76+
To create a new detector for Infrastructure or Custom Metrics from scratch, you can either select :guilabel:`New Detector` under :guilabel:`Detectors & SLOs`, or select :menuselection:`Custom Detector` from the create menu on the navigation bar. Enter a detector name and then select :guilabel:`Create Alert Rule` to proceed to the alert rule builder. For instructions on building the rule, see :ref:`build-rules`.
7777

7878
.. _create-via-api:
7979

@@ -257,7 +257,7 @@ The following table explains different types of email notifications:
257257

258258
.. note:: Tips
259259

260-
- If you want to add the same subscribers to each of multiple rules, you can add the subscribers to all rules at once by using the :ref:`Manage subscriptions<manage-subs>` option on the Detectors tab under Alerts & Detectors after you save the detector.
260+
- If you want to add the same subscribers to each of multiple rules, you can add the subscribers to all rules at once by using the :ref:`Manage subscriptions<manage-subs>` option on the :guilabel:`Detectors` tab under :guilabel:`Detectors & SLOs` after you save the detector.
261261

262262
- You can temporarily stop a detector from sending notifications by :ref:`muting notifications<mute-notifications>`.
263263

@@ -269,7 +269,7 @@ Activate
269269

270270
On the :strong:`Activate` tab you see a summary of the detector settings you specified. Review the summary and make any necessary changes in the associated tabs, then name the rule; by default, the rule name is the same as the detector name. The rule name is displayed on the Alerts page and in notifications.
271271

272-
Select :guilabel:`Activate Alert Rule` to save the detector and begin monitoring the specified signal. After you activate the detector, the :strong:`Alert Rules` tab of the detector is displayed, showing the signal you selected and a summary of the rule you built. You can edit the detector name; the text you enter here is displayed as the detector name on the Detectors tab under Alerts & Detectors. You can also provide additional descriptive text below the name, for example, to clarify the purpose of the detector for others.
272+
Select :guilabel:`Activate Alert Rule` to save the detector and begin monitoring the specified signal. After you activate the detector, the :strong:`Alert Rules` tab of the detector is displayed, showing the signal you selected and a summary of the rule you built. You can edit the detector name; the text you enter here is displayed as the detector name on the :guilabel:`Detectors` tab under :guilabel:`Detectors & SLOs`. You can also provide additional descriptive text below the name, for example, to clarify the purpose of the detector for others.
273273

274274

275275
.. note:: If you make any changes to the detector name or description, select the :guilabel:`Save` button. If you select the :strong:`Close` button without saving, your changes will be lost.

alerts-detectors-notifications/alerts-and-detectors/scenarios-detectors-alerts/find-detectors.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,12 +11,12 @@ Scenario: Kai finds active alerts to investigate a CPU issue
1111

1212
Kai, a site reliability engineer at Buttercup Games, has created a detector called "CPU Detector" that monitors Buttercup Games host machine's CPU usage for sudden changes. Kai has received many alerts from this detector, and wants to get a more detailed view of these alerts.
1313

14-
Using the :guilabel:`Alerts & Detectors` page in Splunk Observability Cloud, Kai can find and view these active alerts so they can easily troubleshoot the CPU changes.
14+
Using the :guilabel:`Detectors & SLOs` page in Splunk Observability Cloud, Kai can find and view these active alerts so they can easily troubleshoot the CPU changes.
1515

1616
Find active alerts using the search list
1717
====================================================
1818

19-
From the :guilabel:`Alerts & Detectors` page, Kai can find active alerts using the search list. Kai follows these steps:
19+
From the :guilabel:`Detectors & SLOs` page, Kai can find active alerts using the search list. Kai follows these steps:
2020

2121
#. Kai wants to find an active alert, so they select the :guilabel:`Active Alerts` tab.
2222
#. Kai enters filters so they can find their active alerts more easily. They enter desired values for the following fields:

alerts-detectors-notifications/alerts-and-detectors/scenarios-detectors-alerts/monitor-server-latency.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ Using Splunk Observability Cloud, Kai can create a detector that alerts them whe
1616
Define the data to use for alerting
1717
===================================
1818

19-
Kai opens the :guilabel:`Alerts & Detectors` page in Splunk Observability Cloud and selects :guilabel:`New Detector` to create a detector from scratch.
19+
Kai opens the :guilabel:`Detectors & SLOs` page in Splunk Observability Cloud and selects :guilabel:`New Detector` to create a detector from scratch.
2020

2121
After naming the detector, Kai chooses :guilabel:`Infrastructure or Custom Metrics Alert Rule`.
2222

0 commit comments

Comments
 (0)