Skip to content
This repository was archived by the owner on Sep 2, 2025. It is now read-only.

Commit 80265d1

Browse files
Merge pull request #2453 from splunk/repo-sync
Pulling refs/heads/main into main
2 parents 5a98654 + 1862412 commit 80265d1

File tree

3 files changed

+10
-3
lines changed

3 files changed

+10
-3
lines changed

admin/references/data-retention.rst

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -60,6 +60,9 @@ The following table shows the retention time period for each data type in RUM.
6060
* - :ref:`Monitoring MetricSets <monitoring-metricsets>`
6161
-
6262
* 13 months
63+
* - :ref:`Session Replay <rum-session-replay>`
64+
-
65+
* 8 days
6366

6467
.. _apm-data-retention:
6568

gdi/get-data-in/application/java/instrumentation/instrument-java-application.rst

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -260,12 +260,16 @@ If you need to send data directly to Splunk Observability Cloud, set the followi
260260
.. code-tab:: bash Linux
261261

262262
export SPLUNK_ACCESS_TOKEN=<access_token>
263-
export SPLUNK_REALM=<realm>
263+
export OTEL_EXPORTER_OTLP_TRACES_PROTOCOL=http/protobuf
264+
export OTEL_EXPORTER_OTLP_TRACES_ENDPOINT=https://ingest.<realm>.signalfx.com/v2/trace/otlp
265+
export OTEL_LOGS_EXPORTER=none
264266

265267
.. code-tab:: shell Windows PowerShell
266268

267269
$env:SPLUNK_ACCESS_TOKEN=<access_token>
268-
$env:SPLUNK_REALM=<realm>
270+
$env:OTEL_EXPORTER_OTLP_TRACES_PROTOCOL=http/protobuf
271+
$env:OTEL_EXPORTER_OTLP_TRACES_ENDPOINT=https://ingest.<realm>.signalfx.com/v2/trace/otlp
272+
$env:OTEL_LOGS_EXPORTER=none
269273

270274
To obtain an access token, see :ref:`admin-api-access-tokens`.
271275

splunkplatform/unified-id/unified-identity.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -164,7 +164,7 @@ If you already have a Splunk Cloud Platform account and a Splunk Observability C
164164
"status": "SUCCESS"
165165
166166
167-
Users will receive an email telling them to authenticate to Splunk Observability Cloud using the new authentication method through Splunk Cloud Platform SSO. Note that users can continue to use their previous login method. If you want to force all users to authenticate through Splunk Cloud Platform SSO, reach out to Splunk Customer Support to deactivate local login. To deactivate login through a third party identity provider, go to :strong:`Data Managemen > Available integrations` in Splunk Observability Cloud, select the appropriate integration (for example, Okta), and select :strong:`Deactivate`.
167+
Users will receive an email telling them to authenticate to Splunk Observability Cloud using the new authentication method through Splunk Cloud Platform SSO. Note that users can continue to use their previous login method. If you want to force all users to authenticate through Splunk Cloud Platform SSO, reach out to Splunk Customer Support to deactivate local login. To deactivate login through a third party identity provider, go to :strong:`Data Management > Available integrations` in Splunk Observability Cloud, select the appropriate integration (for example, Okta), and select :strong:`Deactivate`.
168168

169169

170170
.. _unified-id-user-provisioning:

0 commit comments

Comments
 (0)