-
Notifications
You must be signed in to change notification settings - Fork 135
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #1607 from splunk/repo-sync
Pulling refs/heads/main into main
- Loading branch information
Showing
15 changed files
with
205 additions
and
62 deletions.
There are no files selected for viewing
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,113 @@ | ||
.. _aws-ts-ms-aws: | ||
|
||
****************************************************** | ||
Troubleshoot AWS-managed Metric Streams | ||
****************************************************** | ||
|
||
.. meta:: | ||
:description: Troubleshoot AWS-managed Metric Streams related issues. | ||
|
||
See the following topics when experiencing AWS-managed Metric Streams related issues. | ||
|
||
.. note:: See also :ref:`aws-troubleshooting` and :ref:`aws-ts-metric-streams`. | ||
|
||
I've enabled AWS-managed Metric Streams in my AWS integration but I do not see any metrics streaming in | ||
========================================================================================================== | ||
|
||
Log in to your AWS console and review the following: | ||
|
||
Check the Metric Stream integration settings | ||
---------------------------------------------------------------------- | ||
|
||
In your CloudWatch console check the following: | ||
|
||
* The :strong:`Errors` chart must show zero errors. | ||
|
||
* The destination and output format must look similar to what is visible on the screenshot below. Note that your destination URL might use a different realm, for example https://ingest.us0.signalfx.com/v1/cloudwatch_metric_stream. | ||
|
||
.. image:: /_images/gdi/aws-ts-awsmanaged1.png | ||
:width: 70% | ||
:alt: Metric Stream settings | ||
|
||
Check the associated Firehose stream configuration | ||
---------------------------------------------------------------------- | ||
|
||
Go to your AWS console and check your Firehose stream configuration: | ||
|
||
.. image:: /_images/gdi/aws-ts-awsmanaged2.png | ||
:width: 70% | ||
:alt: Firehose configuration | ||
|
||
Check the associated Firehose stream metrics | ||
---------------------------------------------------------------------- | ||
|
||
Make sure that: | ||
|
||
* :strong:`Incoming records` must have non-zero values. | ||
|
||
* Note that if there's a low volume of traffic going through the stream, the value of ``IncomingRecords (per second average)`` can be significantly lower than ``RecordsPerSecondLimit``, and therefore it might look like there are no incoming records. | ||
|
||
* :strong:`HTTP endpoint delivery success` must be 100%. | ||
|
||
.. image:: /_images/gdi/aws-ts-awsmanaged3.png | ||
:width: 70% | ||
:alt: Firehose stream metrics | ||
|
||
If there are any errors visible on the HTTP endpoint delivery success chart, update the Firehose stream destination settings to ensure that the HTTP endpoint is correct and use a new access token with INGEST scope. | ||
|
||
* Note that your destination URL might use a different realm, for example https://ingest.us0.signalfx.com/v1/cloudwatch_metric_stream. | ||
|
||
.. image:: /_images/gdi/aws-ts-awsmanaged4.png | ||
:width: 70% | ||
:alt: Destination settings | ||
|
||
Review roles and permissions | ||
----------------------------------- | ||
|
||
Check the following: | ||
|
||
* Review the AWS role used by the Metric Streams. | ||
|
||
* Make sure all required permissions are included, and that the CloudWatch metric stream region and the region listed in the AWS policy are the same. | ||
|
||
* To find the AWS role used by the Metric Stream, go to the Stream overview page under the :strong:`Service Role to write to Amazon Data Firehose` label. | ||
|
||
This is a sample AWS policy: | ||
|
||
.. code-block:: none | ||
{ | ||
"Version": "2012-10-17", | ||
"Statement": [ | ||
{ | ||
"Effect": "Allow", | ||
"Action": [ | ||
"firehose:PutRecord", | ||
"firehose:PutRecordBatch" | ||
], | ||
"Resource": [ | ||
"arn:aws:firehose:eu-west-2:906383545488:deliverystream/PUT-HTP-7pH7O" | ||
] | ||
} | ||
] | ||
} | ||
These are the trust relationships: | ||
|
||
.. code-block:: none | ||
{ | ||
"Version": "2012-10-17", | ||
"Statement": [ | ||
{ | ||
"Effect": "Allow", | ||
"Principal": { | ||
"Service": "streams.metrics.cloudwatch.amazonaws.com" | ||
}, | ||
"Action": "sts:AssumeRole" | ||
} | ||
] | ||
} | ||
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
59 changes: 59 additions & 0 deletions
59
gdi/opentelemetry/collector-windows/windows-config-logs.rst
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,59 @@ | ||
.. _windows-config-logs: | ||
|
||
*************************************************************** | ||
Collect logs with the Collector for Windows | ||
*************************************************************** | ||
|
||
.. meta:: | ||
|
||
:description: Describes how to collect logs for the Splunk Distribution of OpenTelemetry Collector for Linux. | ||
|
||
Use the Universal Forwarder to send logs to the Splunk platform. See more at :ref:`collector-with-the-uf`. | ||
|
||
.. _fluentd-manual-config-windows: | ||
|
||
Collect Windows logs with Fluentd | ||
=========================================================================== | ||
|
||
Fluentd is turned off by default. | ||
|
||
If you wish to collect logs for the target host with Fluentd, use the ``with_fluentd = 1`` option to install and enable Fluentd when installing the Collector. | ||
|
||
For example: | ||
|
||
.. code-block:: PowerShell | ||
& {Set-ExecutionPolicy Bypass -Scope Process -Force; $script = ((New-Object System.Net.WebClient).DownloadString('https://dl.signalfx.com/splunk-otel-collector.ps1')); $params = @{access_token = "<SPLUNK_ACCESS_TOKEN>"; realm = "<SPLUNK_REALM>"; with_fluentd = 1}; Invoke-Command -ScriptBlock ([scriptblock]::Create(". {$script} $(&{$args} @params)"))} | ||
When activated, the Fluentd service is configured by default to collect and forward log events with the ``@SPLUNK`` label to the Collector, which then send these events to the HEC ingest endpoint determined by the ``realm = "<SPLUNK_REALM>"`` option. | ||
For example, ``https://ingest.<SPLUNK_REALM>.signalfx.com/v1/log``. | ||
|
||
To configure the package to send log events to a custom HTTP Event Collector (HEC) endpoint URL with a token different than ``<SPLUNK_ACCESS_TOKEN>``, you can specify the following parameters for the installer script: | ||
|
||
* ``hec_url = "<SPLUNK_HEC_URL>"`` | ||
* ``hec_token = "<SPLUNK_HEC_TOKEN>"`` | ||
|
||
For example (replace the ``<SPLUNK...>`` values in the command for your configuration): | ||
|
||
.. code-block:: PowerShell | ||
& {Set-ExecutionPolicy Bypass -Scope Process -Force; $script = ((New-Object System.Net.WebClient).DownloadString('https://dl.signalfx.com/splunk-otel-collector.ps1')); $params = @{access_token = "<SPLUNK_ACCESS_TOKEN>"; realm = "<SPLUNK_REALM>"; hec_url = "<SPLUNK_HEC_URL>"; hec_token = "<SPLUNK_HEC_TOKEN>"}; Invoke-Command -ScriptBlock ([scriptblock]::Create(". {$script} $(&{$args} @params)"))} | ||
The installation creates the main Fluentd configuration file ``<drive>\opt\td-agent\etc\td-agent\td-agent.conf``, where ``<drive>`` is the drive letter for the fluentd installation directory. | ||
|
||
You can add custom Fluentd source configuration files to the ``<drive>\opt\td-agent\etc\td-agent\conf.d`` | ||
directory after installation. | ||
|
||
Note the following: | ||
|
||
* In this directory, Fluentd includes all files with the .conf extension. | ||
* By default, fluentd collects from the Windows Event Log. See ``<drive>\opt\td-agent\etc\td-agent\conf.d\eventlog.conf`` for the default configuration. | ||
|
||
After any configuration modification, apply the changes by restarting the system or running the following PowerShell commands: | ||
|
||
.. code-block:: PowerShell | ||
Stop-Service fluentdwinsvc | ||
Start-Service fluentdwinsvc | ||
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters