Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adding system-scanner #71

Merged
merged 1 commit into from
Oct 3, 2024
Merged

Conversation

bblinder
Copy link

@bblinder bblinder commented Oct 2, 2024

Adding system-scanner scripts, meant to check/report info about the OS and various runtime environments installed on a machine.

Collecting accurate information about operating systems, their architectures, runtimes, and the OTel Collector's environment is crucial for implementation and troubleshooting purposes. However, this requires knowledge of OS-specific commands (e.g., bash vs. PowerShell) and runtime detection, which can vary significantly depending on the programming language and OS (.NET, Java, Python, Node.js, etc.).

This project is a working draft that automates some of these steps as an initial proof-of-concept.

@bblinder
Copy link
Author

bblinder commented Oct 2, 2024

I have read the CLA Document and I hereby sign the CLA

@bblinder
Copy link
Author

bblinder commented Oct 2, 2024

I have read the Code of Conduct and I hereby accept the Terms

Copy link
Collaborator

@greatestusername-splunk greatestusername-splunk left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you for this contribution! This is a great starting point and I'm sure there is a lot of other information it could be used to discover.

@greatestusername-splunk
Copy link
Collaborator

One idea is to have a script to check for k8s clusters and then provide the current configmap for any otel resources
https://github.com/kubernetes-client/python/blob/master/kubernetes/docs/CoreV1Api.md#list_namespaced_config_map

Lots of possibilities!

@greatestusername-splunk greatestusername-splunk merged commit 2563296 into splunk:main Oct 3, 2024
2 checks passed
@github-actions github-actions bot locked and limited conversation to collaborators Oct 3, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants