

Use Data Links to connect APM properties to relevant resources TOGGLE.Monitor Database Query Performance TOGGLE.Visualize and alert on your application in Splunk APM TOGGLE.Correlate traces to track Business Workflows TOGGLE.Analyze services with span tags and MetricSets TOGGLE.Manage services, spans, and traces in Splunk APM TOGGLE.Scenarios for troubleshooting errors and monitoring application performance using Splunk APM TOGGLE.View and manage permissions for detectors.Use and customize AutoDetect alerts and detectors TOGGLE.Alerts and detectors scenario library TOGGLE.Data types in Splunk Observability Cloud.SignalFx Smart Agent (Deprecated) TOGGLE.Splunk Distribution of OpenTelemetry Collector TOGGLE.Available host and application monitors TOGGLE.Instrument front-end applications TOGGLE.Collect infrastructure metrics and logs TOGGLE.Connect to your cloud service provider TOGGLE.Get data into Splunk Observability Cloud.Splunk Observability Cloud and the Splunk platform TOGGLE.Set up alerts and customize your experience Create a plan and set up your organization Is the Splunk platform unable to determine the timestamps correctly? See How timestamp assignment works.Is your data in an unusual character set? See Configure character set encoding.Are the events in your data more than one line? See Configure event line breaking.Then, consider the following scenarios for collecting data:
#SPLUNK O11Y HOW TO#
See Overview of event processing and How indexing works so that you can make decisions about how to make the Splunk platform work with your data.
#SPLUNK O11Y SOFTWARE#
If you do not get the results you want, you can tweak things to make sure the software indexes your events correctly. If you have logs from a custom application or device, process it with the default configuration first. The Splunk platform can index any time-series data, usually without additional configuration. You can repeat this task to add other inputs as you familiarize yourself with getting data in. When you are ready to index the data permanently, configure the inputs to use the default main index.Delete the data from your test index and start over, if necessary.If necessary, tweak your input and event processing configurations further until events look the way you want them to.Did the default configurations work well for your events?.Do you see the sort of data you were expecting?.Review the test data that you added with the Search & Reporting app.Preview and modify how your data will be indexed before committing the data to the test index.Any data you add to your test index counts against your maximum daily indexing volume for licensing purposes. Create a test index and add a few inputs.To add data, follow these high-level steps: What do I want to do with the indexed data? Should I use forwarders to access remote data? Where does the data reside? Is it local or remote? You can go to either the Search & Reporting app or the main app page and begin exploring the data that you collected.īefore you start adding inputs to your deployment, ask yourself the following questions: See Use apps and add-ons to get data in.Īfter you configure the inputs or enable an app, your Splunk deployment stores and processes the specified data.
#SPLUNK O11Y DOWNLOAD#
With a Splunk Cloud Platform deployment, you might need to configure a heavy forwarder or universal forwarder to send the data to your Splunk Cloud Platform instance.Īlternatively, you can download and enable an app, such as the Splunk App for Microsoft Exchange or Splunk IT Service Intelligence. For the most straightforward option, use Splunk Web. To get started with getting data into your Splunk deployment, point your deployment at some data by configuring an input.
