diff --git a/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/admission-webhooks/operator-webhook-with-cert-manager.yaml b/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/admission-webhooks/operator-webhook-with-cert-manager.yaml index 251f781774..8a69d8ba0d 100644 --- a/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/admission-webhooks/operator-webhook-with-cert-manager.yaml +++ b/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/admission-webhooks/operator-webhook-with-cert-manager.yaml @@ -6,9 +6,9 @@ metadata: annotations: cert-manager.io/inject-ca-from: default/default-operator-serving-cert labels: - helm.sh/chart: operator-0.34.1 + helm.sh/chart: operator-0.35.0 app.kubernetes.io/name: operator - app.kubernetes.io/version: "0.81.0" + app.kubernetes.io/version: "0.82.0" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: default app.kubernetes.io/component: webhook @@ -85,9 +85,9 @@ metadata: annotations: cert-manager.io/inject-ca-from: default/default-operator-serving-cert labels: - helm.sh/chart: operator-0.34.1 + helm.sh/chart: operator-0.35.0 app.kubernetes.io/name: operator - app.kubernetes.io/version: "0.81.0" + app.kubernetes.io/version: "0.82.0" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: default app.kubernetes.io/component: webhook diff --git a/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/certmanager.yaml b/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/certmanager.yaml index b2a372b34f..ea12192e47 100644 --- a/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/certmanager.yaml +++ b/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/certmanager.yaml @@ -7,9 +7,9 @@ metadata: helm.sh/hook: post-install,post-upgrade helm.sh/hook-weight: "1" labels: - helm.sh/chart: operator-0.34.1 + helm.sh/chart: operator-0.35.0 app.kubernetes.io/name: operator - app.kubernetes.io/version: "0.81.0" + app.kubernetes.io/version: "0.82.0" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: default app.kubernetes.io/component: webhook @@ -35,9 +35,9 @@ metadata: helm.sh/hook: post-install,post-upgrade helm.sh/hook-weight: "1" labels: - helm.sh/chart: operator-0.34.1 + helm.sh/chart: operator-0.35.0 app.kubernetes.io/name: operator - app.kubernetes.io/version: "0.81.0" + app.kubernetes.io/version: "0.82.0" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: default app.kubernetes.io/component: webhook diff --git a/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/clusterrole.yaml b/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/clusterrole.yaml index 1949b96199..ea7a6908c8 100644 --- a/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/clusterrole.yaml +++ b/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/clusterrole.yaml @@ -4,9 +4,9 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: labels: - helm.sh/chart: operator-0.34.1 + helm.sh/chart: operator-0.35.0 app.kubernetes.io/name: operator - app.kubernetes.io/version: "0.81.0" + app.kubernetes.io/version: "0.82.0" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: default app.kubernetes.io/component: controller-manager @@ -201,9 +201,9 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: labels: - helm.sh/chart: operator-0.34.1 + helm.sh/chart: operator-0.35.0 app.kubernetes.io/name: operator - app.kubernetes.io/version: "0.81.0" + app.kubernetes.io/version: "0.82.0" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: default app.kubernetes.io/component: controller-manager @@ -219,9 +219,9 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRole metadata: labels: - helm.sh/chart: operator-0.34.1 + helm.sh/chart: operator-0.35.0 app.kubernetes.io/name: operator - app.kubernetes.io/version: "0.81.0" + app.kubernetes.io/version: "0.82.0" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: default app.kubernetes.io/component: controller-manager diff --git a/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/clusterrolebinding.yaml b/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/clusterrolebinding.yaml index 23821e25d3..3fcf8c8f43 100644 --- a/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/clusterrolebinding.yaml +++ b/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/clusterrolebinding.yaml @@ -4,9 +4,9 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: labels: - helm.sh/chart: operator-0.34.1 + helm.sh/chart: operator-0.35.0 app.kubernetes.io/name: operator - app.kubernetes.io/version: "0.81.0" + app.kubernetes.io/version: "0.82.0" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: default app.kubernetes.io/component: controller-manager @@ -25,9 +25,9 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: ClusterRoleBinding metadata: labels: - helm.sh/chart: operator-0.34.1 + helm.sh/chart: operator-0.35.0 app.kubernetes.io/name: operator - app.kubernetes.io/version: "0.81.0" + app.kubernetes.io/version: "0.82.0" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: default app.kubernetes.io/component: controller-manager diff --git a/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/deployment.yaml b/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/deployment.yaml index 96cc5963d0..843fa88540 100644 --- a/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/deployment.yaml +++ b/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/deployment.yaml @@ -4,9 +4,9 @@ apiVersion: apps/v1 kind: Deployment metadata: labels: - helm.sh/chart: operator-0.34.1 + helm.sh/chart: operator-0.35.0 app.kubernetes.io/name: operator - app.kubernetes.io/version: "0.81.0" + app.kubernetes.io/version: "0.82.0" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: default app.kubernetes.io/component: controller-manager @@ -33,13 +33,13 @@ spec: - --enable-leader-election - --health-probe-addr=:8081 - --webhook-port=9443 - - --collector-image=otel/opentelemetry-collector-contrib:0.81.0 + - --collector-image=otel/opentelemetry-collector-contrib:0.82.0 command: - /manager env: - name: ENABLE_WEBHOOKS value: "true" - image: "ghcr.io/open-telemetry/opentelemetry-operator/opentelemetry-operator:v0.81.0" + image: "ghcr.io/open-telemetry/opentelemetry-operator/opentelemetry-operator:v0.82.0" name: manager ports: - containerPort: 8080 diff --git a/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/role.yaml b/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/role.yaml index f2e3b92e45..36973f5bf0 100644 --- a/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/role.yaml +++ b/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/role.yaml @@ -4,9 +4,9 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: Role metadata: labels: - helm.sh/chart: operator-0.34.1 + helm.sh/chart: operator-0.35.0 app.kubernetes.io/name: operator - app.kubernetes.io/version: "0.81.0" + app.kubernetes.io/version: "0.82.0" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: default app.kubernetes.io/component: controller-manager diff --git a/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/rolebinding.yaml b/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/rolebinding.yaml index 0d38e75995..4b1e2d18e1 100644 --- a/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/rolebinding.yaml +++ b/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/rolebinding.yaml @@ -4,9 +4,9 @@ apiVersion: rbac.authorization.k8s.io/v1 kind: RoleBinding metadata: labels: - helm.sh/chart: operator-0.34.1 + helm.sh/chart: operator-0.35.0 app.kubernetes.io/name: operator - app.kubernetes.io/version: "0.81.0" + app.kubernetes.io/version: "0.82.0" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: default app.kubernetes.io/component: controller-manager diff --git a/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/service.yaml b/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/service.yaml index 6916fa9563..edc86a3ece 100644 --- a/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/service.yaml +++ b/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/service.yaml @@ -4,9 +4,9 @@ apiVersion: v1 kind: Service metadata: labels: - helm.sh/chart: operator-0.34.1 + helm.sh/chart: operator-0.35.0 app.kubernetes.io/name: operator - app.kubernetes.io/version: "0.81.0" + app.kubernetes.io/version: "0.82.0" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: default app.kubernetes.io/component: controller-manager @@ -31,9 +31,9 @@ apiVersion: v1 kind: Service metadata: labels: - helm.sh/chart: operator-0.34.1 + helm.sh/chart: operator-0.35.0 app.kubernetes.io/name: operator - app.kubernetes.io/version: "0.81.0" + app.kubernetes.io/version: "0.82.0" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: default app.kubernetes.io/component: controller-manager diff --git a/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/serviceaccount.yaml b/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/serviceaccount.yaml index 7a561ed84b..701c14e0ad 100644 --- a/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/serviceaccount.yaml +++ b/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/serviceaccount.yaml @@ -6,9 +6,9 @@ metadata: name: operator namespace: default labels: - helm.sh/chart: operator-0.34.1 + helm.sh/chart: operator-0.35.0 app.kubernetes.io/name: operator - app.kubernetes.io/version: "0.81.0" + app.kubernetes.io/version: "0.82.0" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: default app.kubernetes.io/component: controller-manager diff --git a/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/tests/test-certmanager-connection.yaml b/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/tests/test-certmanager-connection.yaml index 7dd7a51a03..70d7f251c5 100644 --- a/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/tests/test-certmanager-connection.yaml +++ b/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/tests/test-certmanager-connection.yaml @@ -6,9 +6,9 @@ metadata: name: "default-operator-cert-manager" namespace: default labels: - helm.sh/chart: operator-0.34.1 + helm.sh/chart: operator-0.35.0 app.kubernetes.io/name: operator - app.kubernetes.io/version: "0.81.0" + app.kubernetes.io/version: "0.82.0" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: default app.kubernetes.io/component: webhook diff --git a/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/tests/test-service-connection.yaml b/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/tests/test-service-connection.yaml index d3aed2b82b..62a4b83192 100644 --- a/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/tests/test-service-connection.yaml +++ b/examples/enable-operator-and-auto-instrumentation/rendered_manifests/operator/tests/test-service-connection.yaml @@ -6,9 +6,9 @@ metadata: name: "default-operator-metrics" namespace: default labels: - helm.sh/chart: operator-0.34.1 + helm.sh/chart: operator-0.35.0 app.kubernetes.io/name: operator - app.kubernetes.io/version: "0.81.0" + app.kubernetes.io/version: "0.82.0" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: default app.kubernetes.io/component: controller-manager @@ -43,9 +43,9 @@ metadata: name: "default-operator-webhook" namespace: default labels: - helm.sh/chart: operator-0.34.1 + helm.sh/chart: operator-0.35.0 app.kubernetes.io/name: operator - app.kubernetes.io/version: "0.81.0" + app.kubernetes.io/version: "0.82.0" app.kubernetes.io/managed-by: Helm app.kubernetes.io/instance: default app.kubernetes.io/component: controller-manager diff --git a/examples/kafkametricsreceiver-metrics/rendered_manifests/clusterRole.yaml b/examples/kafkametricsreceiver-metrics/rendered_manifests/clusterRole.yaml new file mode 100644 index 0000000000..edebf0f15f --- /dev/null +++ b/examples/kafkametricsreceiver-metrics/rendered_manifests/clusterRole.yaml @@ -0,0 +1,83 @@ +--- +# Source: splunk-otel-collector/templates/clusterRole.yaml +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + name: default-splunk-otel-collector + labels: + app.kubernetes.io/name: splunk-otel-collector + helm.sh/chart: splunk-otel-collector-0.82.0 + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/instance: default + app.kubernetes.io/version: "0.82.0" + app: splunk-otel-collector + chart: splunk-otel-collector-0.82.0 + release: default + heritage: Helm +rules: +- apiGroups: + - "" + resources: + - events + - namespaces + - namespaces/status + - nodes + - nodes/spec + - nodes/stats + - nodes/proxy + - pods + - pods/status + - persistentvolumeclaims + - persistentvolumes + - replicationcontrollers + - replicationcontrollers/status + - resourcequotas + - services + verbs: + - get + - list + - watch +- apiGroups: + - apps + resources: + - daemonsets + - deployments + - replicasets + - statefulsets + verbs: + - get + - list + - watch +- apiGroups: + - extensions + resources: + - daemonsets + - deployments + - replicasets + verbs: + - get + - list + - watch +- apiGroups: + - batch + resources: + - jobs + - cronjobs + verbs: + - get + - list + - watch +- apiGroups: + - autoscaling + resources: + - horizontalpodautoscalers + verbs: + - get + - list + - watch +- nonResourceURLs: + - /metrics + verbs: + - get + - list + - watch diff --git a/examples/kafkametricsreceiver-metrics/rendered_manifests/clusterRoleBinding.yaml b/examples/kafkametricsreceiver-metrics/rendered_manifests/clusterRoleBinding.yaml new file mode 100644 index 0000000000..7546225186 --- /dev/null +++ b/examples/kafkametricsreceiver-metrics/rendered_manifests/clusterRoleBinding.yaml @@ -0,0 +1,24 @@ +--- +# Source: splunk-otel-collector/templates/clusterRoleBinding.yaml +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: default-splunk-otel-collector + labels: + app.kubernetes.io/name: splunk-otel-collector + helm.sh/chart: splunk-otel-collector-0.82.0 + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/instance: default + app.kubernetes.io/version: "0.82.0" + app: splunk-otel-collector + chart: splunk-otel-collector-0.82.0 + release: default + heritage: Helm +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: default-splunk-otel-collector +subjects: +- kind: ServiceAccount + name: default-splunk-otel-collector + namespace: default diff --git a/examples/kafkametricsreceiver-metrics/rendered_manifests/configmap-agent.yaml b/examples/kafkametricsreceiver-metrics/rendered_manifests/configmap-agent.yaml new file mode 100644 index 0000000000..17d8607dc2 --- /dev/null +++ b/examples/kafkametricsreceiver-metrics/rendered_manifests/configmap-agent.yaml @@ -0,0 +1,309 @@ +--- +# Source: splunk-otel-collector/templates/configmap-agent.yaml +apiVersion: v1 +kind: ConfigMap +metadata: + name: default-splunk-otel-collector-otel-agent + labels: + app.kubernetes.io/name: splunk-otel-collector + helm.sh/chart: splunk-otel-collector-0.82.0 + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/instance: default + app.kubernetes.io/version: "0.82.0" + app: splunk-otel-collector + chart: splunk-otel-collector-0.82.0 + release: default + heritage: Helm +data: + relay: | + exporters: + sapm: + access_token: ${SPLUNK_OBSERVABILITY_ACCESS_TOKEN} + endpoint: https://ingest.CHANGEME.signalfx.com/v2/trace + signalfx: + access_token: ${SPLUNK_OBSERVABILITY_ACCESS_TOKEN} + api_url: https://api.CHANGEME.signalfx.com + correlation: null + ingest_url: https://ingest.CHANGEME.signalfx.com + sync_host_metadata: true + splunk_hec/o11y: + disable_compression: true + endpoint: https://ingest.CHANGEME.signalfx.com/v1/log + log_data_enabled: true + profiling_data_enabled: false + token: ${SPLUNK_OBSERVABILITY_ACCESS_TOKEN} + extensions: + health_check: null + k8s_observer: + auth_type: serviceAccount + node: ${K8S_NODE_NAME} + memory_ballast: + size_mib: ${SPLUNK_BALLAST_SIZE_MIB} + zpages: null + processors: + batch: null + filter/logs: + logs: + exclude: + match_type: strict + resource_attributes: + - key: splunk.com/exclude + value: "true" + groupbyattrs/logs: + keys: + - com.splunk.source + - com.splunk.sourcetype + - container.id + - fluent.tag + - k8s.container.name + - k8s.namespace.name + - k8s.pod.name + - k8s.pod.uid + k8sattributes: + extract: + annotations: + - from: pod + key: splunk.com/sourcetype + - from: namespace + key: splunk.com/exclude + tag_name: splunk.com/exclude + - from: pod + key: splunk.com/exclude + tag_name: splunk.com/exclude + - from: namespace + key: splunk.com/index + tag_name: com.splunk.index + - from: pod + key: splunk.com/index + tag_name: com.splunk.index + labels: + - key: app + metadata: + - k8s.namespace.name + - k8s.node.name + - k8s.pod.name + - k8s.pod.uid + - container.id + - container.image.name + - container.image.tag + filter: + node_from_env_var: K8S_NODE_NAME + pod_association: + - sources: + - from: resource_attribute + name: k8s.pod.uid + - sources: + - from: resource_attribute + name: k8s.pod.ip + - sources: + - from: resource_attribute + name: ip + - sources: + - from: connection + - sources: + - from: resource_attribute + name: host.name + memory_limiter: + check_interval: 2s + limit_mib: ${SPLUNK_MEMORY_LIMIT_MIB} + resource: + attributes: + - action: insert + key: k8s.node.name + value: ${K8S_NODE_NAME} + - action: upsert + key: k8s.cluster.name + value: CHANGEME + resource/add_agent_k8s: + attributes: + - action: insert + key: k8s.pod.name + value: ${K8S_POD_NAME} + - action: insert + key: k8s.pod.uid + value: ${K8S_POD_UID} + - action: insert + key: k8s.namespace.name + value: ${K8S_NAMESPACE} + resource/logs: + attributes: + - action: upsert + from_attribute: k8s.pod.annotations.splunk.com/sourcetype + key: com.splunk.sourcetype + - action: delete + key: k8s.pod.annotations.splunk.com/sourcetype + - action: delete + key: splunk.com/exclude + resourcedetection: + detectors: + - env + - system + override: true + timeout: 10s + receivers: + fluentforward: + endpoint: 0.0.0.0:8006 + hostmetrics: + collection_interval: 10s + scrapers: + cpu: null + disk: null + filesystem: null + load: null + memory: null + network: null + paging: null + processes: null + jaeger: + protocols: + grpc: + endpoint: 0.0.0.0:14250 + thrift_http: + endpoint: 0.0.0.0:14268 + kafkametrics: + brokers: kafka-service:9092 + protocol_version: 2.0.0 + scrapers: + - brokers + - topics + - consumers + kubeletstats: + auth_type: serviceAccount + collection_interval: 10s + endpoint: ${K8S_NODE_IP}:10250 + extra_metadata_labels: + - container.id + metric_groups: + - container + - pod + - node + otlp: + protocols: + grpc: + endpoint: 0.0.0.0:4317 + http: + endpoint: 0.0.0.0:4318 + prometheus/agent: + config: + scrape_configs: + - job_name: otel-agent + scrape_interval: 10s + static_configs: + - targets: + - ${K8S_POD_IP}:8889 + receiver_creator: + receivers: + smartagent/coredns: + config: + extraDimensions: + metric_source: k8s-coredns + port: 9153 + type: coredns + rule: type == "pod" && labels["k8s-app"] == "kube-dns" + smartagent/kube-controller-manager: + config: + extraDimensions: + metric_source: kubernetes-controller-manager + port: 10257 + skipVerify: true + type: kube-controller-manager + useHTTPS: true + useServiceAccount: true + rule: type == "pod" && labels["k8s-app"] == "kube-controller-manager" + smartagent/kubernetes-apiserver: + config: + extraDimensions: + metric_source: kubernetes-apiserver + skipVerify: true + type: kubernetes-apiserver + useHTTPS: true + useServiceAccount: true + rule: type == "port" && port == 443 && pod.labels["k8s-app"] == "kube-apiserver" + smartagent/kubernetes-proxy: + config: + extraDimensions: + metric_source: kubernetes-proxy + port: 10249 + scrapeFailureLogLevel: debug + type: kubernetes-proxy + rule: type == "pod" && labels["k8s-app"] == "kube-proxy" + smartagent/kubernetes-scheduler: + config: + extraDimensions: + metric_source: kubernetes-scheduler + port: 10259 + skipVerify: true + type: kubernetes-scheduler + useHTTPS: true + useServiceAccount: true + rule: type == "pod" && labels["k8s-app"] == "kube-scheduler" + watch_observers: + - k8s_observer + signalfx: + endpoint: 0.0.0.0:9943 + smartagent/signalfx-forwarder: + listenAddress: 0.0.0.0:9080 + type: signalfx-forwarder + zipkin: + endpoint: 0.0.0.0:9411 + service: + extensions: + - health_check + - k8s_observer + - memory_ballast + - zpages + pipelines: + logs: + exporters: + - splunk_hec/o11y + processors: + - memory_limiter + - groupbyattrs/logs + - k8sattributes + - filter/logs + - batch + - resourcedetection + - resource + - resource/logs + receivers: + - fluentforward + - otlp + metrics: + exporters: + - signalfx + processors: + - memory_limiter + - batch + - resourcedetection + - resource + receivers: + - kafkametrics + metrics/agent: + exporters: + - signalfx + processors: + - memory_limiter + - batch + - resource/add_agent_k8s + - resourcedetection + - resource + receivers: + - prometheus/agent + traces: + exporters: + - sapm + - signalfx + processors: + - memory_limiter + - k8sattributes + - batch + - resourcedetection + - resource + receivers: + - otlp + - jaeger + - smartagent/signalfx-forwarder + - zipkin + telemetry: + metrics: + address: 0.0.0.0:8889 diff --git a/examples/kafkametricsreceiver-metrics/rendered_manifests/configmap-cluster-receiver.yaml b/examples/kafkametricsreceiver-metrics/rendered_manifests/configmap-cluster-receiver.yaml new file mode 100644 index 0000000000..9dcd252067 --- /dev/null +++ b/examples/kafkametricsreceiver-metrics/rendered_manifests/configmap-cluster-receiver.yaml @@ -0,0 +1,109 @@ +--- +# Source: splunk-otel-collector/templates/configmap-cluster-receiver.yaml +apiVersion: v1 +kind: ConfigMap +metadata: + name: default-splunk-otel-collector-otel-k8s-cluster-receiver + labels: + app.kubernetes.io/name: splunk-otel-collector + helm.sh/chart: splunk-otel-collector-0.82.0 + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/instance: default + app.kubernetes.io/version: "0.82.0" + app: splunk-otel-collector + chart: splunk-otel-collector-0.82.0 + release: default + heritage: Helm +data: + relay: | + exporters: + signalfx: + access_token: ${SPLUNK_OBSERVABILITY_ACCESS_TOKEN} + api_url: https://api.CHANGEME.signalfx.com + ingest_url: https://ingest.CHANGEME.signalfx.com + timeout: 10s + extensions: + health_check: null + memory_ballast: + size_mib: ${SPLUNK_BALLAST_SIZE_MIB} + processors: + batch: + send_batch_max_size: 32768 + memory_limiter: + check_interval: 2s + limit_mib: ${SPLUNK_MEMORY_LIMIT_MIB} + resource: + attributes: + - action: insert + key: metric_source + value: kubernetes + - action: upsert + key: k8s.cluster.name + value: CHANGEME + resource/add_collector_k8s: + attributes: + - action: insert + key: k8s.node.name + value: ${K8S_NODE_NAME} + - action: insert + key: k8s.pod.name + value: ${K8S_POD_NAME} + - action: insert + key: k8s.pod.uid + value: ${K8S_POD_UID} + - action: insert + key: k8s.namespace.name + value: ${K8S_NAMESPACE} + resource/k8s_cluster: + attributes: + - action: insert + key: receiver + value: k8scluster + resourcedetection: + detectors: + - env + - system + override: true + timeout: 10s + receivers: + k8s_cluster: + auth_type: serviceAccount + metadata_exporters: + - signalfx + prometheus/k8s_cluster_receiver: + config: + scrape_configs: + - job_name: otel-k8s-cluster-receiver + scrape_interval: 10s + static_configs: + - targets: + - ${K8S_POD_IP}:8889 + service: + extensions: + - health_check + - memory_ballast + pipelines: + metrics: + exporters: + - signalfx + processors: + - memory_limiter + - batch + - resource + - resource/k8s_cluster + receivers: + - k8s_cluster + metrics/collector: + exporters: + - signalfx + processors: + - memory_limiter + - batch + - resource/add_collector_k8s + - resourcedetection + - resource + receivers: + - prometheus/k8s_cluster_receiver + telemetry: + metrics: + address: 0.0.0.0:8889 diff --git a/examples/kafkametricsreceiver-metrics/rendered_manifests/configmap-fluentd-json.yaml b/examples/kafkametricsreceiver-metrics/rendered_manifests/configmap-fluentd-json.yaml new file mode 100644 index 0000000000..38343158da --- /dev/null +++ b/examples/kafkametricsreceiver-metrics/rendered_manifests/configmap-fluentd-json.yaml @@ -0,0 +1,24 @@ +--- +# Source: splunk-otel-collector/templates/configmap-fluentd-json.yaml +apiVersion: v1 +kind: ConfigMap +metadata: + name: default-splunk-otel-collector-fluentd-json + labels: + app.kubernetes.io/name: splunk-otel-collector + helm.sh/chart: splunk-otel-collector-0.82.0 + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/instance: default + app.kubernetes.io/version: "0.82.0" + app: splunk-otel-collector + chart: splunk-otel-collector-0.82.0 + release: default + heritage: Helm +data: + source.containers.parse.conf: |- + @type json + time_format %Y-%m-%dT%H:%M:%S.%NZ + + output.filter.conf: "" + + output.transform.conf: "" diff --git a/examples/kafkametricsreceiver-metrics/rendered_manifests/configmap-fluentd.yaml b/examples/kafkametricsreceiver-metrics/rendered_manifests/configmap-fluentd.yaml new file mode 100644 index 0000000000..15fc15c5f0 --- /dev/null +++ b/examples/kafkametricsreceiver-metrics/rendered_manifests/configmap-fluentd.yaml @@ -0,0 +1,352 @@ +--- +# Source: splunk-otel-collector/templates/configmap-fluentd.yaml +apiVersion: v1 +kind: ConfigMap +metadata: + name: default-splunk-otel-collector-fluentd + labels: + app.kubernetes.io/name: splunk-otel-collector + helm.sh/chart: splunk-otel-collector-0.82.0 + app.kubernetes.io/managed-by: Helm + app.kubernetes.io/instance: default + app.kubernetes.io/version: "0.82.0" + app: splunk-otel-collector + chart: splunk-otel-collector-0.82.0 + release: default + heritage: Helm +data: + fluent.conf: |- + @include system.conf + @include source.containers.conf + @include source.files.conf + @include source.journald.conf + @include output.conf + @include prometheus.conf + + system.conf: |- + # system wide configurations + + log_level info + root_dir /tmp/fluentd + + + prometheus.conf: |- + # input plugin that exports metrics + + @type prometheus + + + # input plugin that collects metrics from MonitorAgent + + @type prometheus_monitor + + + # input plugin that collects metrics for output plugin + + @type prometheus_output_monitor + + + source.containers.conf: |- + # This configuration file for Fluentd / td-agent is used + # to watch changes to Docker log files. The kubelet creates symlinks that + # capture the pod name, namespace, container name & Docker container ID + # to the docker logs for pods in the /var/log/containers directory on the host. + # If running this fluentd configuration in a Docker container, the /var/log + # directory should be mounted in the container. + # reading kubelet logs from journal + # + # Reference: + # https://github.com/kubernetes/community/blob/20d2f6f5498a5668bae2aea9dcaf4875b9c06ccb/contributors/design-proposals/node/kubelet-cri-logging.md + # + # Json Log Example: + # {"log":"[info:2016-02-16T16:04:05.930-08:00] Some log text here\n","stream":"stdout","time":"2016-02-17T00:04:05.931087621Z"} + # CRI Log Example (not supported): + # 2016-02-17T00:04:05.931087621Z stdout P { 'long': { 'json', 'object output' }, + # 2016-02-17T00:04:05.931087621Z stdout F 'splitted': 'partial-lines' } + # 2016-02-17T00:04:05.931087621Z stdout F [info:2016-02-16T16:04:05.930-08:00] Some log text here + + @id containers.log + @type tail + @label @CONCAT + tag tail.containers.* + path /var/log/containers/*.log + pos_file /var/log/splunk-fluentd-containers.log.pos + path_key source + read_from_head true + + @include source.containers.parse.conf + time_key time + time_type string + localtime false + + + + source.files.conf: |- + # This fluentd conf file contains sources for log files other than container logs. + + @id tail.file.kube-audit + @type tail + @label @CONCAT + tag tail.file.kube:apiserver-audit + path /var/log/kube-apiserver-audit.log + pos_file /var/log/splunk-fluentd-kube-audit.pos + read_from_head true + path_key source + + @type regexp + expression /^(?.*)$/ + time_key time + time_type string + time_format %Y-%m-%dT%H:%M:%SZ + + + + source.journald.conf: |- + # This fluentd conf file contains configurations for reading logs from systemd journal. + + @id journald-docker + @type systemd + @label @CONCAT + tag journald.kube:docker + path "/run/log/journal" + matches [{ "_SYSTEMD_UNIT": "docker.service" }] + read_from_head true + + @type local + persistent true + path /var/log/splunkd-fluentd-journald-docker.pos.json + + + field_map {"MESSAGE": "log", "_SYSTEMD_UNIT": "source"} + field_map_strict true + + + + @id journald-kubelet + @type systemd + @label @CONCAT + tag journald.kube:kubelet + path "/run/log/journal" + matches [{ "_SYSTEMD_UNIT": "kubelet.service" }] + read_from_head true + + @type local + persistent true + path /var/log/splunkd-fluentd-journald-kubelet.pos.json + + + field_map {"MESSAGE": "log", "_SYSTEMD_UNIT": "source"} + field_map_strict true + + + + output.conf: |- + #Events are emitted to the CONCAT label from the container, file and journald sources for multiline processing. + + + source.containers.parse.conf: |- + @type regexp + expression /^(?