Skip to content

Commit 322d328

Browse files
committed
added otelcol
1 parent 366fda6 commit 322d328

File tree

1 file changed

+121
-0
lines changed

1 file changed

+121
-0
lines changed

kubernetes/otelcol-base.yaml

Lines changed: 121 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,121 @@
1+
clusterReceiver:
2+
eventsEnabled: true
3+
k8sObjects:
4+
- name: events
5+
mode: watch
6+
namespaces: [default, splunk]
7+
- name: pods
8+
mode: watch
9+
namespaces: [default, splunk]
10+
agent:
11+
extraEnvs:
12+
- name: WORKSHOP_ENVIRONMENT
13+
valueFrom:
14+
secretKeyRef:
15+
name: workshop-secret
16+
key: instance
17+
config:
18+
receivers:
19+
smartagent/http:
20+
type: http
21+
host: dev-astronomy.splunko11y.com
22+
useHTTPS: true
23+
receiver_creator:
24+
receivers:
25+
mysql/online-boutique:
26+
rule: type == "port" && pod.name matches "mysql" && port == 3306
27+
config:
28+
tls:
29+
insecure: true
30+
username: root
31+
password: root
32+
database: LxvGChW075
33+
redis:
34+
rule: type == "port" && pod.name matches "redis-cart" && port == 6379
35+
config:
36+
endpoint: "redis-cart:6379"
37+
collection_interval: 10s
38+
sqlserver:
39+
collection_interval: 10s
40+
username: sa
41+
password: "ChangeMe_SuperStrong123!"
42+
server: sql-server-fraud.sql.svc.cluster.local
43+
port: 1433
44+
resource_attributes:
45+
sqlserver.computer.name:
46+
enabled: true
47+
sqlserver.instance.name:
48+
enabled: true
49+
# ADD to ENABLE Database Monitoring
50+
events:
51+
db.server.query_sample:
52+
enabled: true
53+
db.server.top_query:
54+
enabled: true
55+
56+
processors:
57+
filter/drop_flagd:
58+
traces:
59+
span:
60+
- attributes["rpc.method"] == "EventStream"
61+
- attributes["rpc.method"] == "ResolveAll"
62+
- attributes["rpc.method"] == "ResolveBoolean"
63+
- attributes["rpc.method"] == "ResolveFloat"
64+
- attributes["rpc.method"] == "ResolveInt"
65+
- attributes["http.url"] == "http://flagd:8016/ofrep/v1/evaluate/flags/loadGeneratorFloodHomepage"
66+
- attributes["url.full"] == "http://flagd:8013/flagd.evaluation.v1.Service/ResolveBoolean"
67+
- attributes["otel.scope.name"] == "flagd.evaluation.v1"
68+
- attributes["url.full"] == "http://flagd:8013/flagd.evaluation.v1.Service/EventStream"
69+
70+
# Exporters define where the telemetry data is sent to
71+
exporters:
72+
# Exports dbmon events as logs
73+
otlphttp/dbmon:
74+
headers:
75+
X-SF-Token: 3QThm3q899dAU8udj-i4tA
76+
X-splunk-instrumentation-library: dbmon
77+
logs_endpoint: https://ingest.us1.signalfx.com/v3/event
78+
sending_queue:
79+
batch:
80+
flush_timeout: 15s
81+
max_size: 10485760 # 10 MiB
82+
sizer: bytes
83+
84+
service:
85+
pipelines:
86+
metrics:
87+
exporters: [signalfx]
88+
processors: [memory_limiter, k8sattributes, batch, resourcedetection, resource]
89+
receivers: [hostmetrics, kubeletstats, otlp, sqlserver, receiver_creator, signalfx]
90+
traces:
91+
exporters: [signalfx, otlphttp]
92+
processors: [memory_limiter, filter/drop_flagd, k8sattributes, batch, resourcedetection, resource, resource/add_environment]
93+
receivers: [otlp, jaeger, zipkin]
94+
logs/dbmon:
95+
receivers:
96+
- sqlserver
97+
processors:
98+
- memory_limiter
99+
#- resource/tns
100+
- batch
101+
- resourcedetection
102+
exporters:
103+
- otlphttp/dbmon
104+
logsCollection:
105+
extraFileLogs:
106+
filelog/syslog:
107+
include: [/var/log/syslog]
108+
include_file_path: true
109+
include_file_name: false
110+
resource:
111+
com.splunk.source: /var/log/syslog
112+
host.name: 'EXPR(env("K8S_NODE_NAME"))'
113+
com.splunk.sourcetype: syslog
114+
filelog/auth_log:
115+
include: [/var/log/auth.log]
116+
include_file_path: true
117+
include_file_name: false
118+
resource:
119+
com.splunk.source: /var/log/auth.log
120+
host.name: 'EXPR(env("K8S_NODE_NAME"))'
121+
com.splunk.sourcetype: auth_log

0 commit comments

Comments
 (0)