-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathcollector.yaml
182 lines (177 loc) · 4.88 KB
/
collector.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
extensions:
memory_ballast:
size_in_percentage: 33
file_storage/psq:
directory: /persistant_sending_queue
timeout: 10s # in what time a file lock should be obtained
compaction:
directory: /persistant_sending_queue
on_start: true
on_rebound: true
rebound_needed_threshold_mib: 5
rebound_trigger_threshold_mib: 3
receivers:
smartagent/postgresql:
type: postgresql
host: db
port: 5432
connectionString: 'sslmode=disable user=monitor password=pass'
masterDBName: default_database
extraMetrics:
- postgres_conflicts
- postgres_pct_connections
prometheus:
config:
scrape_configs:
- job_name: prometheus-generator
scrape_interval: 10s
static_configs:
- targets:
- oteldemo-prometheus-generator-1:2112
- oteldemo-prometheus-generator-2:2112
- oteldemo-prometheus-generator-3:2112
- oteldemo-prometheus-generator-4:2112
- oteldemo-prometheus-generator-5:2112
- oteldemo-prometheus-generator-6:2112
- oteldemo-prometheus-generator-7:2112
- oteldemo-prometheus-generator-8:2112
prometheus/internal:
config:
scrape_configs:
- job_name: otel-collector
scrape_interval: 2s
static_configs:
- targets:
- 0.0.0.0:8888
metric_relabel_configs:
- source_labels:
- __name__
regex: .*grpc_io.*
action: drop
smartagent/custom:
type: collectd/custom
template: |
LoadPlugin network
<Plugin network>
Listen "0.0.0.0" "23456"
</Plugin>
processors:
batch:
memory_limiter:
check_interval: 2s
limit_mib: 1024
resourcedetection:
detectors:
- ec2
- gce
- azure
- ecs
- system
override: false
resourcedetection/internal:
detectors:
- ec2
- gce
- azure
- ecs
- system
override: true
metricstransform/host:
transforms:
- include: (.*)
match_type: regexp
action: update
operations:
- action: update_label
label: host
new_label: net.host.name
exporters:
sapm:
access_token: ${SPLUNK_ACCESS_TOKEN}
endpoint: ${SPLUNK_TRACE_URL}
signalfx:
access_token: ${SPLUNK_ACCESS_TOKEN}
api_url: ${SPLUNK_API_URL}
ingest_url: ${SPLUNK_INGEST_URL}
sync_host_metadata: true
correlation:
splunk_hec/metrics:
token: ${SPLUNK_HEC_TOKEN_METRICS}
endpoint: ${SPLUNK_HEC_URL}
source: otel
sourcetype: otel
# Splunk index, optional name of the Splunk index targeted.
index: "metrics"
# Maximum HTTP connections to use simultaneously when sending data. Defaults to 100.
max_connections: 20
# Whether to disable gzip compression over HTTP. Defaults to false.
disable_compression: false
# HTTP timeout when sending data. Defaults to 10s.
timeout: 10s
# Whether to skip checking the certificate of the HEC endpoint
# when sending data over HTTPS. Defaults to false.
# For this demo, we use a self-signed certificate on the Splunk docker instance,
# so this flag is set to true.
tls:
insecure_skip_verify: true
retry_on_failure:
enabled: true
initial_interval: 1s
max_interval: 300s
max_elapsed_time: 120s
sending_queue:
storage: file_storage/psq
splunk_hec/otelcol:
token: ${SPLUNK_HEC_TOKEN_OTELCOL}
endpoint: ${SPLUNK_HEC_URL}
source: otel
sourcetype: otel
# Splunk index, optional name of the Splunk index targeted.
index: "metrics"
# Maximum HTTP connections to use simultaneously when sending data. Defaults to 100.
max_connections: 20
# Whether to disable gzip compression over HTTP. Defaults to false.
disable_compression: false
# HTTP timeout when sending data. Defaults to 10s.
timeout: 1s
# Whether to skip checking the certificate of the HEC endpoint
# when sending data over HTTPS. Defaults to false.
# For this demo, we use a self-signed certificate on the Splunk docker instance,
# so this flag is set to true.
tls:
insecure_skip_verify: true
retry_on_failure:
enabled: true
initial_interval: 1s
max_interval: 300s
max_elapsed_time: 120s
logging:
loglevel: debug
service:
extensions:
- memory_ballast
- file_storage/psq
pipelines:
metrics/metrics:
receivers:
- smartagent/postgresql
- prometheus
- smartagent/custom
processors:
- memory_limiter
- batch
- resourcedetection
- metricstransform/host
exporters:
- splunk_hec/metrics
metrics/otelcol:
receivers:
- prometheus/internal
processors:
- memory_limiter
- batch
- resourcedetection
- metricstransform/host
exporters:
- splunk_hec/otelcol
#- logging