Getting Started • Getting Involved • Migrating from Smart Agent
Architecture • Components • Monitoring • Security • Sizing • Troubleshooting
Splunk OpenTelemetry Connector is a distribution of the OpenTelemetry Collector. It provides a unified way to receive, process, and export metric, trace, and log data for Splunk Observability Cloud:
- Splunk APM via the
sapm
exporter. Theotlphttp
exporter can be used with a custom configuration. More information available here. - Splunk Infrastructure
Monitoring
via the
signalfx
exporter. More information available here. - Splunk Log Observer via
the
splunk_hec
exporter.
While it is recommended to use Splunk
Forwarders
to send data to Splunk
Cloud or Splunk
Enterprise,
Splunk OpenTelemetry Connector can be configured to send data to them via the
splunk_hec
exporter.
🚧 This project is currently in BETA (what does beta mean?)
The following resources are available:
- Architecture: How the Connector can be deployed
- Components: What the Connector supports with links to documentation
- Monitoring: How to ensure the Connector is healthy
- Security: How to ensure the Connector is secure
- Sizing: How to ensure the Connector is properly sized
- Troubleshooting: How to resolve common issues
All you need to get started is:
- Splunk Access Token
- Splunk Realm
- Agent or Gateway mode
- Confirm exposed ports to make sure your environment doesn't have conflicts and that firewalls are configured properly. Ports can be changed in the collector's configuration.
This distribution is supported on and packaged for a variety of platforms including:
- Kubernetes
- HashiCorp Nomad
- Linux
- Installer script (recommended)
- Configuration management
- Platform as a Service
- Manual including DEB/RPM packages, Docker, and binary
- Windows
- Installer script (recommended)
- Configuration management
- Manual including MSI with GUI and Powershell, Chocolatey, and Docker
You can consult additional use cases in the examples directory.
A variety of default configuration files are provided:
- OpenTelemetry
Collector
see
full_config_linux.yaml
for a commented configuration with links to full documentation.agent_config.yaml
is the recommended starting configuration for most environments. - Fluentd
applicable to Helm or installer script installations only. See the
*.conf
files as well as theconf.d
directory. Common sources including filelog, journald, and Windows event viewer are included.
In addition, the following components can be configured:
- Configuration sources
- SignalFx Smart Agent
The following changes need to be done to configuration files for Splunk OTel Collector for specific version upgrades. We provide automated scripts included in the bundle that cover backward compatibility on the fly, but configuration files will not be overridden, so you need to update them manually before the backward compatibility is dropped. For every configuration update use the default agent config as a reference.
-
Configuration parameter "
exporters
->otlp
->insecure
" is moved to "exporters
->otlp
->tls
->insecure
".More details: open-telemetry/opentelemetry-collector#4063.
Configuration part for
otlp
exporter should look like this:exporters: otlp: endpoint: "${SPLUNK_GATEWAY_URL}:4317" tls: insecure: true
-
ballast_size_mib
parameter moved frommemory_limiter
processor tomemory_ballast
extension assize_mib
.More details: signalfx#567.
Remove
ballast_size_mib
parameter frommemory_limiter
and make sure that it's added tomemory_ballast
extension assize_mib
parameter instead:extensions: memory_ballast: size_mib: ${SPLUNK_BALLAST_SIZE_MIB}
It is possible to use the upstream OpenTelemetry Collector instead of this distribution. The following features are not available upstream at this time:
- Packaging
- Installer scripts for Linux and Windows
- Configuration management via Ansible or Puppet
- Configuration sources
- Several SignalFx Smart Agent capabilities
In order to use the upstream OpenTelemetry Collector:
- Use the contrib distribution as commercial exporters must reside in contrib
- Properly configuration the Collector
An example configuration for upstream, that ensures infrastructure correlation is properly configured, is available here.