Skip to content
This repository was archived by the owner on Sep 2, 2025. It is now read-only.

Commit 97061dc

Browse files
Merge pull request #1627 from splunk/repo-sync
Pulling refs/heads/main into main
2 parents 5ff2cb7 + 7881afe commit 97061dc

File tree

6 files changed

+68
-51
lines changed

6 files changed

+68
-51
lines changed

_includes/gdi/available-azure.rst

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
You can collect data from the following Azure services out-of-the-box:
1+
By default Splunk Observability Cloud collects metrics from the Azure services listed on the table below as explained in :ref:`connect-to-azure`.
22

33
.. list-table::
44
:header-rows: 1
@@ -251,3 +251,15 @@ You can collect data from the following Azure services out-of-the-box:
251251
* - VPN Gateway
252252
- microsoft.network/virtualnetworkgateways
253253

254+
Add additional services
255+
============================================
256+
257+
If you want to collect data from other Azure services you need to add them as a custom service in the UI, or with the field ``additionalServices`` if you're using the API. Splunk Observability Cloud syncs resource types that you specify in services and custom services. If you add a resource type to both fields, Splunk Observability Cloud ignores the duplication.
258+
259+
Any resource type you specify as a custom service must meet the following criteria:
260+
261+
* The resource must be an Azure GenericResource type.
262+
263+
* If the resource type has a hierarchical structure, only the root resource type is a GenericResource. For example, a Storage Account type can have a File Service type, which in turn can have a File Storage type. In this case, only Storage Account is a GenericResource.
264+
265+
* The resource type stores its metrics in Azure Monitor. To learn more about Azure Monitor, refer to the Microsoft Azure documentation.

alerts-detectors-notifications/alerts-and-detectors/alert-condition-reference/hist-anomaly.rst

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,9 @@ Basic settings
3434

3535
* - :strong:`Cycle length`
3636
- Integer >= 1, followed by time indicator (s, m, h, d, w). For example, 30s, 10m, 2h, 5d, 1w. Set this value to be significantly larger than the native resolution.
37-
- The time range that reflects the cyclicity of your signal. For example, a value of 1w indicates your signal follows a weekly cycle (you want to compare data for a Monday morning with previous Monday mornings). A value of 1d indicates your signal follows a daily cycle (you want to compare today's data with data from the same time yesterday, the day before, and so on.)
37+
- | The time range that reflects the cycle of your signal. For example, a value of ``1w`` indicates your signal follows a weekly cycle, and a value of ``1d`` indicates your signal follows a daily cycle.
38+
| Cycle length works in conjunction with the duration of the time window used for data comparison, represented by the :strong:`Current window` parameter. Data from the current window will be compared against data from one or more previous cycles to detect historical anomaly, depending on the value of the :strong:`Number of previous cycles` parameter.
39+
| For example, if the current window is ``1h`` and the cycle length is ``1w``, data in the past hour ([-1h, now]) is compared against data from the [-1w1h, -1w] hour, [-2w1h, -2w] hour, and so on.
3840
3941
* - :strong:`Alert when`
4042
- ``Too high``, ``Too low``, ``Too high or Too low``
@@ -62,7 +64,7 @@ Advanced settings
6264
- If the short-term variation in a signal is small relative to the scale of the signal, and the scale is somehow natural, using ``Mean plus percentage change`` is recommended; using ``Mean plus standard deviation`` might trigger alerts even for a large number of standard deviations. In addition, ``Mean plus percentage change`` is recommended for metrics which admit a direct business interpretation. For instance, if ``user_sessions`` drops by 20%, revenue drops by 5%.
6365

6466
* - :strong:`Current window`
65-
- Integer >= 1, followed by time indicator (s, m, h, d, w). For example, 30s, 10m, 2h, 5d, 1w. Set this value to be smaller than Cycle length, and significantly larger than the native resolution.
67+
- Integer >= 1, followed by time indicator (s, m, h, d, w). For example, 30s, 10m, 2h, 5d, 1w. Set this value to be shorter than cycle length, and significantly larger than the native resolution.
6668
- The time range against which to compare the data; you can think of this as the moving average window. Higher values compute the mean over more data points, which generally smoothes the value, resulting in lower sensitivity and potentially fewer alerts.
6769

6870
* - :strong:`Number of previous cycles`

gdi/get-data-in/connect/azure/azure-metrics.rst

Lines changed: 3 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -7,18 +7,13 @@ Azure metrics in Splunk Observability Cloud
77
.. meta::
88
:description: These are the metrics available for the Azure integration with Splunk Observability Cloud, grouped according to Azure resource.
99

10-
By default Splunk Observability Cloud includes all available metrics from any Azure integration.
10+
.. include:: /_includes/gdi/available-azure.rst
1111

12-
Azure services metrics
13-
=================================
12+
Azure services metric information
13+
================================================
1414

1515
Metric names and descriptions are generated dynamically from data provided by Microsoft. See all details in Microsoft's :new-page:`Supported metrics with Azure Monitor <https://learn.microsoft.com/en-us/azure/azure-monitor/essentials/metrics-supported>`.
1616

17-
.. include:: /_includes/gdi/available-azure.rst
18-
19-
Types of available metrics
20-
-------------------------------------------
21-
2217
Every metric can either be a counter or a gauge, depending on what dimension is being looked at. If the MTS contains the dimension ``aggregation_type: total`` or ``aggregation_type: count``, then it is sent as a counter. Otherwise, it is sent as a gauge. To learn more, see :ref:`metric-types` and :ref:`metric-time-series`.
2318

2419
Azure functions metrics

metrics-and-metadata/relatedcontent.rst

Lines changed: 39 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -73,7 +73,7 @@ The following table describes when and where in Splunk Observability Cloud you c
7373
Use the Splunk Distribution of the OpenTelemetry Collector to enable Related Content
7474
==========================================================================================================
7575

76-
Splunk Observability Cloud uses OpenTelemetry to correlate telemetry types. To enable this ability, your telemetry field names or metadata key names must exactly match the metadata key names used by both OpenTelemetry and Splunk Observability Cloud.
76+
Splunk Observability Cloud uses OpenTelemetry to correlate telemetry types. To do this, your telemetry field names or metadata key names must exactly match the metadata key names used by both OpenTelemetry and Splunk Observability Cloud.
7777

7878
Related Content works out-of-the-box when you deploy the Splunk Distribution of the OpenTelemetry Collector with its default configuration to send your telemetry data to Splunk Observability Cloud. With the default configuration the Collector automatically maps your metadata key names correctly. To learn more about the Collector, see :ref:`otel-intro`.
7979

@@ -108,7 +108,7 @@ When the field names in APM and Log Observer match, the trace and the log with t
108108
Required Collector components
109109
=================================================================
110110

111-
If you're using the Splunk Distribution of the OpenTelemetry Collector, another distribution of the Collector, or the :ref:`upstream Collector <using-upstream-otel>` and want to ensure Related Content in Splunk Observability Cloud behaves correctly, verify that the SignalFx exporter is included in your configuration. This exporter aggregates the metrics from the ``hostmetrics`` receiver and must be enabled for the ``metrics`` and ``traces`` pipelines.
111+
If you're using the Splunk Distribution of the OpenTelemetry Collector, any other distribution of the Collector, or the :ref:`upstream Collector <using-upstream-otel>` and want to ensure Related Content in Splunk Observability Cloud behaves correctly, verify that the SignalFx exporter is included in your configuration. This exporter aggregates the metrics from the ``hostmetrics`` receiver and must be enabled for the ``metrics`` and ``traces`` pipelines.
112112

113113
The Collector uses the correlation flag of the SignalFx exporter to make relevant API calls to correlate your spans with the infrastructure metrics. This flag is enabled by default. To adjust the correlation option further, see the SignalFx exporter's options at :ref:`signalfx-exporter-settings`.
114114

@@ -124,10 +124,12 @@ The following sections list the metadata key names required to enable Related Co
124124
Splunk APM
125125
-----------------------------------------------------------------
126126

127-
The following APM span tags are required to enable Related Content:
127+
To enable Related Content for APM use one of these span tags:
128128

129129
- ``service.name``
130-
- ``deployment.environment``
130+
- ``trace_id``
131+
132+
Optionally, you can also use ``deployment.environment`` with ``service.name``.
131133

132134
The default configuration of the Splunk Distribution of the OpenTelemetry Collector already provides these span tags. To ensure full functionality of Related Content, do not change any of the metadata key names or span tags provided by the Splunk OTel Collector.
133135

@@ -154,39 +156,58 @@ For example, consider a scenario in which Related Content needs to return data f
154156
Splunk Infrastructure Monitoring
155157
-----------------------------------------------------------------
156158

157-
The following Infrastructure Monitoring metadata keys are required to enable Related Content:
159+
To enable Related Content for IM use one of these metadata combinations:
158160

159-
- ``host.name``
161+
- ``host.name``. It falls back on ``host``, ``aws_private_dns_name`` (AWS), ``instance_name`` (GCP), ``azure_computer_name`` (Azure)
160162
- ``k8s.cluster.name``
161-
- ``k8s.node.name``
162-
- ``k8s.pod.name``
163-
- ``container.id``
164-
- ``k8s.namespace.name``
165-
- ``kubernetes.workload.name``
163+
- ``k8s.cluster.name`` + ``k8s.node.name``
164+
- ``k8s.cluster.name`` + ``k8s.node.name`` (optional) + ``k8s.pod.name``
165+
- ``k8s.cluster.name`` + ``k8s.node.name`` (optional) + ``k8s.pod.name`` (optional) + ``container.id``
166+
- ``service.name``
167+
- ``service.name`` + ``deployment.environment`` (optional) + ``k8s.cluster.name`` (optional)
166168

167169
If you're using the default configuration of the Splunk Distribution of the OpenTelemetry Collector for Kubernetes, the required Infrastructure Monitoring metadata is provided. See more at :ref:`otel-install-k8s`.
168170

169171
If you're using other distributions of the OpenTelemetry Collector or non-default configurations of the Splunk Distribution to collect infrastructure data, Related Content won't work out of the box.
170172

171173
.. _relatedcontent-log-observer:
172174

173-
Splunk Log Observer
175+
Splunk logs
174176
-----------------------------------------------------------------
175177

176-
.. include:: /_includes/log-observer-transition.rst
177-
178-
The following key names are required to enable Related Content for Log Observer:
178+
To enable Related Content for logs use one of these fields:
179179

180-
- ``service.name``
181-
- ``deployment.environment``
182180
- ``host.name``
183-
- ``trace_id``
181+
- ``service.name``
184182
- ``span_id``
183+
- ``trace_id``
185184

186185
To ensure full functionality of both Log Observer and Related Content, verify that your log events fields are correctly mapped. Correct log field mappings enable built-in log filtering, embed logs in APM and Infrastructure Monitoring functionality, and enable fast searches as well as the Related Content bar.
187186

188187
If the key names in the preceding list use different names in your log fields, remap them to the key names listed here. For example, if you don't see values for :strong:`host.name` in the Log Observer UI, check to see whether your logs use a different field name, such as :strong:`host_name`. If your logs do not contain the default field names exactly as they appear in the preceding list, remap your logs using one of the methods in the following section.
189188

189+
.. include:: /_includes/log-observer-transition.rst
190+
191+
Kubernetes log fields
192+
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
193+
194+
The Splunk Distribution of the OpenTelemetry Collector injects the following fields into your Kubernetes logs. Do not modify them if you want to use Related Content.
195+
196+
- ``k8s.cluster.name``
197+
- ``k8s.node.name``
198+
- ``k8s.pod.name``
199+
- ``container.id``
200+
- ``k8s.namespace.name``
201+
- ``kubernetes.workload.name``
202+
203+
Use one of these tag combinations to enable Related Content:
204+
205+
- ``k8s.cluster.name`` + ``k8s.node.name``
206+
- ``k8s.cluster.name`` + ``k8s.node.name`` (optional) + ``k8s.pod.name``
207+
- ``k8s.cluster.name`` + ``k8s.node.name`` (optional) + ``k8s.pod.name`` (optional) + ``container.id``
208+
209+
Learn more about the Collector for Kubernetes at :ref:`collector-kubernetes-intro`.
210+
190211
.. _remap-log-fields:
191212

192213
Remap log fields
@@ -207,7 +228,6 @@ The following table describes the four methods for remapping log fields:
207228
* - Client-side
208229
- Configure your app to remap the necessary fields.
209230

210-
211231
When to use Log Field Aliasing
212232
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
213233

@@ -218,20 +238,6 @@ Use Log Field Aliasing to remap fields in Splunk Observability Cloud when you ca
218238
- You do not want to transform your data at index time.
219239
- You want the new alias to affect every log message, even those that came in from a time before you created the alias.
220240

221-
Kubernetes log fields
222-
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
223-
224-
The Splunk Distribution of the OpenTelemetry Collector injects the following fields into your Kubernetes logs. Do not modify them if you want to use Related Content.
225-
226-
- ``k8s.cluster.name``
227-
- ``k8s.node.name``
228-
- ``k8s.pod.name``
229-
- ``container.id``
230-
- ``k8s.namespace.name``
231-
- ``kubernetes.workload.name``
232-
233-
Learn more about the Collector for Kubernetes at :ref:`collector-kubernetes-intro`.
234-
235241
How to change your metadata key names
236242
=================================================================
237243

rum/rum-rules.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@ This example shows how to use a ``<?>`` symbol to apply a single token wildcard
122122
<??> Wildcard for one or more trailing tokens
123123
--------------------------------------------------------
124124

125-
This example shows how to use a ``<??>`` wildcard to group together URLs by one or more tokens. The ``<??>`` wildcard is supported only as the last wild card in a pattern at this time.
125+
This example shows how to use a ``<??>`` wildcard to group together URLs by one or more tokens. The ``<??>`` wildcard is supported only as the last wildcard in a pattern at this time.
126126

127127

128128
.. list-table::

synthetics/test-config/synth-alerts.rst

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -47,12 +47,15 @@ You can set up a detector while initially creating or editing a test, or from th
4747

4848
To set up a detector, do one of the following:
4949

50-
* While creating or editing a test, select :guilabel:`+ Create detector`. The detector dialog box opens.
51-
* From the :guilabel:`Test results` page for a particular test, select :guilabel:`+ Create detector`. The detector dialog box opens.
50+
* While creating or editing a test, select :guilabel:`Create detector`. The detector dialog box opens.
51+
* From the :guilabel:`Test results` page for a particular test, select :guilabel:`Create detector`. The detector dialog box opens.
5252

5353
In the detector dialog box, enter the following fields:
5454

55-
#. In the test name list, select the tests you want to include in your detector. If you want to include all tests of the same type, select :strong:`All tests`.
55+
#. In the test name list, select the tests you want to include in your detector. If you want to include all tests you see in the list, select the :strong:`All tests` check box.
56+
57+
.. note:: The :strong:`All tests` option uses wildcard ( * ) in the program text and always covers all tests of the same type.
58+
5659
#. In the metric list, select the metric you want to receive alerts for. By default, a detector tracks :strong:`Uptime` metric.
5760
#. The default :guilabel:`Static threshold` alert condition can't be changed.
5861
#. Select :strong:`+ Add filters` to scope the alerts by dimension. For Browser tests, you can use this selector to scope the detector to the entire test, a particular page within the test, or a particular synthetic transaction within the test. See the following sections for details:
@@ -63,13 +66,12 @@ In the detector dialog box, enter the following fields:
6366
#. In the :guilabel:`Alert details` section, enter the following:
6467

6568
* :guilabel:`Trigger threshold`: The threshold to trigger the alert.
66-
* :guilabel:`Orientation`: Specify whether the metric must fall below or exceed the threshold to trigger the alert.
69+
* :guilabel:`Orientation`: Only available for uptime metric. Specify whether the metric must fall below or exceed the threshold to trigger the alert.
6770
* :guilabel:`Violates threshold`: How many times the metric must violate the threshold to trigger the alert.
6871
* :guilabel:`Split by location`: Select whether to split the detector by test location. If you don't filter by location, the detector monitors the average value across all locations.
6972

7073
#. Use the severity selector to select the severity of the alert.
71-
#. Add recipients.
72-
#. (Optional) Add a URL to a runbook.
74+
#. Add recipients.
7375
#. Select :guilabel:`Activate`.
7476

7577
.. _page-level-detector:

0 commit comments

Comments
 (0)