You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Sep 2, 2025. It is now read-only.
Use the :new-page:`Splunk Distribution of OpenTelemetry Collector <https://docs.splunk.com/Observability/gdi/opentelemetry/deployment-modes.html>` in data forwarding (gateway) mode. You can forward metrics locally to the Splunk Distribution of OpenTelemetry Collector, which serves as your local store-and-forward service for telemetry.
31
+
The :new-page:`Splunk Distribution of OpenTelemetry Collector <https://docs.splunk.com/Observability/gdi/opentelemetry/deployment-modes.html>` supports proxies. You can configure proxies on each collector, or more typically, you would configure a collector in data forwarding (gateway) mode. In the gateway mode, you only need to configure the gateway collectors with the proxy settings; all other collectors can simply send data to the gateway collector.
32
32
33
33
Ensure that you give the Splunk Distribution of OpenTelemetry Collector the ability to resolve the network names and make outbound HTTPS network connections to the URLs listed in :ref:`allow-urls` or the domains listed in :ref:`allow-domains`. Verify also the list of :ref:`exposed ports and endpoints <otel-exposed-endpoints>`.
Copy file name to clipboardExpand all lines: admin/authentication/authentication-tokens/manage-usage.rst
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -166,7 +166,7 @@ To set token limits:
166
166
167
167
#. If you chose a team as a notification recipient and you want to have alerts display on the team's Dashboards page, you must link the detector you created in the previous step to the team. To do this:
168
168
169
-
#. Access the left navigation panel and select :menuselection:`Alerts&Detectors`.
169
+
#. Access the left navigation panel and select :menuselection:`Detectors&SLOs`.
170
170
#. Select the :guilabel:`Detectors` tab.
171
171
#. Search for the detector you created. By default, the detector's name includes the name of the access token it was created for. So, an easy way to find the detector is to search for the name of the access token.
172
172
#. Open the detector's action menu (|more|) and select :guilabel:`Links to Teams`. Select a team.
Copy file name to clipboardExpand all lines: alerts-detectors-notifications/alerts-and-detectors/autodetect/autodetect-intro.rst
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -22,7 +22,7 @@ See the following topics for more information on how to collect the required dat
22
22
- :new-page-ref:`kafka`
23
23
- :ref:`get-started-k8s`
24
24
25
-
After you've set up the supported integrations, AutoDetect alerts and detectors automatically appear on the :strong:`Alerts & Detectors` page and the corresponding dashboards and navigators for your integrations.
25
+
After you've set up the supported integrations, AutoDetect alerts and detectors automatically appear on the :guilabel:`Detectors&SLOs` page and the corresponding dashboards and navigators for your integrations.
26
26
27
27
.. note:: By default, you aren't subscribed to receive notifications from AutoDetect. To learn how to subscribe to AutoDetect notifications, see :ref:`autodetect-subscribe-mute-turn-off`.
Copy file name to clipboardExpand all lines: alerts-detectors-notifications/alerts-and-detectors/autodetect/autodetect-view.rst
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,11 +6,11 @@ View AutoDetect alerts and detectors
6
6
.. meta::
7
7
:description: Splunk Observability Cloud automatically creates alerts and detectors when you have supported integrations configured. Learn how to use and customize with AutoDetect alerts and detectors.
8
8
9
-
You can view AutoDetect detectors on the :guilabel:`Alerts&Detectors` page, in a navigator or dashboard for a service, or in a chart.
9
+
You can view AutoDetect detectors on the :guilabel:`Detectors&SLOs` page, in a navigator or dashboard for a service, or in a chart.
10
10
11
11
To view a complete list of all available AutoDetect alerts and detectors in your organization, do the following:
12
12
13
-
#. From the Splunk Observability Cloud home page, go to the :guilabel:`Alerts&Detectors` page.
13
+
#. From the Splunk Observability Cloud home page, go to the :guilabel:`Detectors&SLOs` page.
14
14
#. Select the :guilabel:`Active Alerts` or :guilabel:`Detectors` tab. Alerts genereated by AutoDetect detectors have an :guilabel:`Auto` badge.
15
15
#. You can also select :guilabel:`AutoDetect` or :guilabel:`Customized AutoDetect` in the filter on the :guilabel:`Active Alerts` or :guilabel:`Detectors` tabs.
Copy file name to clipboardExpand all lines: alerts-detectors-notifications/alerts-and-detectors/create-detectors-for-alerts.rst
+5-5Lines changed: 5 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,7 +13,7 @@ Detectors are made up of alert rules. When you create an alert rule you can sele
13
13
14
14
When a detector determines that the conditions for a rule are met, it triggers an alert, creates an event, and sends notifications, if specified. Detectors can send notifications through email, as well as through other systems, such as Slack, or by using a webhook. To learn more, see :ref:`admin-notifs-index`.
15
15
16
-
You can find active alerts, existing detectors, and muting rules under :guilabel:`Alerts&Detectors`. You can also find alerts in the Events Feed, available within any dashboard.
16
+
You can find active alerts, existing detectors, and muting rules under :guilabel:`Detectors&SLOs`. You can also find alerts in the Events Feed, available within any dashboard.
17
17
18
18
.. note:: This topic covers Infrastructure and Custom Metrics detectors. You can create a Splunk APM detector to monitor request rates, error rates, and latency for your service. To learn more about Splunk APM detectors, visit :ref:`apm-alerts`.
19
19
@@ -45,7 +45,7 @@ There are several ways to create a detector.
To create a new detector for Infrastructure or Custom Metrics from scratch, you can either select :guilabel:`New Detector` under Alerts & Detectors, or select :menuselection:`Custom Detector` from the create menu on the navigation bar. Enter a detector name and then select :guilabel:`Create Alert Rule` to proceed to the alert rule builder. For instructions on building the rule, see :ref:`build-rules`.
76
+
To create a new detector for Infrastructure or Custom Metrics from scratch, you can either select :guilabel:`New Detector` under :guilabel:`Detectors&SLOs`, or select :menuselection:`Custom Detector` from the create menu on the navigation bar. Enter a detector name and then select :guilabel:`Create Alert Rule` to proceed to the alert rule builder. For instructions on building the rule, see :ref:`build-rules`.
77
77
78
78
.. _create-via-api:
79
79
@@ -257,7 +257,7 @@ The following table explains different types of email notifications:
257
257
258
258
.. note:: Tips
259
259
260
-
- If you want to add the same subscribers to each of multiple rules, you can add the subscribers to all rules at once by using the :ref:`Manage subscriptions<manage-subs>` option on the Detectors tab under Alerts & Detectors after you save the detector.
260
+
- If you want to add the same subscribers to each of multiple rules, you can add the subscribers to all rules at once by using the :ref:`Manage subscriptions<manage-subs>` option on the :guilabel:`Detectors` tab under :guilabel:`Detectors&SLOs` after you save the detector.
261
261
262
262
- You can temporarily stop a detector from sending notifications by :ref:`muting notifications<mute-notifications>`.
263
263
@@ -269,7 +269,7 @@ Activate
269
269
270
270
On the :strong:`Activate` tab you see a summary of the detector settings you specified. Review the summary and make any necessary changes in the associated tabs, then name the rule; by default, the rule name is the same as the detector name. The rule name is displayed on the Alerts page and in notifications.
271
271
272
-
Select :guilabel:`Activate Alert Rule` to save the detector and begin monitoring the specified signal. After you activate the detector, the :strong:`Alert Rules` tab of the detector is displayed, showing the signal you selected and a summary of the rule you built. You can edit the detector name; the text you enter here is displayed as the detector name on the Detectors tab under Alerts & Detectors. You can also provide additional descriptive text below the name, for example, to clarify the purpose of the detector for others.
272
+
Select :guilabel:`Activate Alert Rule` to save the detector and begin monitoring the specified signal. After you activate the detector, the :strong:`Alert Rules` tab of the detector is displayed, showing the signal you selected and a summary of the rule you built. You can edit the detector name; the text you enter here is displayed as the detector name on the :guilabel:`Detectors` tab under :guilabel:`Detectors&SLOs`. You can also provide additional descriptive text below the name, for example, to clarify the purpose of the detector for others.
273
273
274
274
275
275
.. note:: If you make any changes to the detector name or description, select the :guilabel:`Save` button. If you select the :strong:`Close` button without saving, your changes will be lost.
Copy file name to clipboardExpand all lines: alerts-detectors-notifications/alerts-and-detectors/scenarios-detectors-alerts/find-detectors.rst
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,12 +11,12 @@ Scenario: Kai finds active alerts to investigate a CPU issue
11
11
12
12
Kai, a site reliability engineer at Buttercup Games, has created a detector called "CPU Detector" that monitors Buttercup Games host machine's CPU usage for sudden changes. Kai has received many alerts from this detector, and wants to get a more detailed view of these alerts.
13
13
14
-
Using the :guilabel:`Alerts&Detectors` page in Splunk Observability Cloud, Kai can find and view these active alerts so they can easily troubleshoot the CPU changes.
14
+
Using the :guilabel:`Detectors&SLOs` page in Splunk Observability Cloud, Kai can find and view these active alerts so they can easily troubleshoot the CPU changes.
0 commit comments