All Apps and Add-ons

Dynatrace Application Performance Management: Where to locate the source types?

romantic_warrio
New Member

The documentation ( https://community.dynatrace.com/community/display/DL/Splunk+Application ) says :

"By simply enabling the HTTP export of any Business Transactions you can now use them in splunk. The Splunk Application distinguishes between 4 source types
•pp - PurePath
•pa - PageAction (Client Action)
•visit - Visit
•alert - Alert"

I do see an index named "dynatrace" but not the source types. Does anyone know where they come from or their definitions?

Thanks

0 Karma
1 Solution

Dynatrace
Path Finder

The source types are configured by the app in the inputs.conf file. The instance of Flume managed by the app takes the protobuf data streamed from Dynatrace and writes it to specific locations on the filesystem. These locations are then ingested by Splunk and bucketed in the appropriate source type:

[monitor://$SPLUNK_HOME/etc/apps/compuwareapm/log/bt-export/pa]
disabled = false
index=dynatrace
time_before_close=60
sourcetype = pa

[monitor://$SPLUNK_HOME/etc/apps/compuwareapm/log/bt-export/pp]
disabled = false
index=dynatrace
time_before_close=60
sourcetype = pp

[monitor://$SPLUNK_HOME/etc/apps/compuwareapm/log/bt-export/visit]
disabled = false
index=dynatrace
time_before_close=60
sourcetype = visit

[monitor://$SPLUNK_HOME/etc/apps/compuwareapm/log/alerts]
disabled = false
followTail = 0
sourcetype = alert
index = dynatrace

View solution in original post

0 Karma

aaraneta_splunk
Splunk Employee
Splunk Employee

@romantic_warrior1 - Did the answer provided by Dynatrace help provide a working solution to your question? If yes, please don't forget to resolve this post by clicking "Accept". If no, please leave a comment with more feedback. Thanks!

0 Karma

Dynatrace
Path Finder

The source types are configured by the app in the inputs.conf file. The instance of Flume managed by the app takes the protobuf data streamed from Dynatrace and writes it to specific locations on the filesystem. These locations are then ingested by Splunk and bucketed in the appropriate source type:

[monitor://$SPLUNK_HOME/etc/apps/compuwareapm/log/bt-export/pa]
disabled = false
index=dynatrace
time_before_close=60
sourcetype = pa

[monitor://$SPLUNK_HOME/etc/apps/compuwareapm/log/bt-export/pp]
disabled = false
index=dynatrace
time_before_close=60
sourcetype = pp

[monitor://$SPLUNK_HOME/etc/apps/compuwareapm/log/bt-export/visit]
disabled = false
index=dynatrace
time_before_close=60
sourcetype = visit

[monitor://$SPLUNK_HOME/etc/apps/compuwareapm/log/alerts]
disabled = false
followTail = 0
sourcetype = alert
index = dynatrace

0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.
Get Updates on the Splunk Community!

Tech Talk Recap | Mastering Threat Hunting

Mastering Threat HuntingDive into the world of threat hunting, exploring the key differences between ...

Observability for AI Applications: Troubleshooting Latency

If you’re working with proprietary company data, you’re probably going to have a locally hosted LLM or many ...

Splunk AI Assistant for SPL vs. ChatGPT: Which One is Better?

In the age of AI, every tool promises to make our lives easier. From summarizing content to writing code, ...