All Apps and Add-ons

Dynatrace Application Performance Management: Where to locate the source types?

New Member

The documentation ( https://community.dynatrace.com/community/display/DL/Splunk+Application ) says :

"By simply enabling the HTTP export of any Business Transactions you can now use them in splunk. The Splunk Application distinguishes between 4 source types
•pp - PurePath
•pa - PageAction (Client Action)
•visit - Visit
•alert - Alert"

I do see an index named "dynatrace" but not the source types. Does anyone know where they come from or their definitions?

Thanks

0 Karma
1 Solution

Path Finder

The source types are configured by the app in the inputs.conf file. The instance of Flume managed by the app takes the protobuf data streamed from Dynatrace and writes it to specific locations on the filesystem. These locations are then ingested by Splunk and bucketed in the appropriate source type:

[monitor://$SPLUNK_HOME/etc/apps/compuwareapm/log/bt-export/pa]
disabled = false
index=dynatrace
time_before_close=60
sourcetype = pa

[monitor://$SPLUNK_HOME/etc/apps/compuwareapm/log/bt-export/pp]
disabled = false
index=dynatrace
time_before_close=60
sourcetype = pp

[monitor://$SPLUNK_HOME/etc/apps/compuwareapm/log/bt-export/visit]
disabled = false
index=dynatrace
time_before_close=60
sourcetype = visit

[monitor://$SPLUNK_HOME/etc/apps/compuwareapm/log/alerts]
disabled = false
followTail = 0
sourcetype = alert
index = dynatrace

View solution in original post

0 Karma

Splunk Employee
Splunk Employee

@romantic_warrior1 - Did the answer provided by Dynatrace help provide a working solution to your question? If yes, please don't forget to resolve this post by clicking "Accept". If no, please leave a comment with more feedback. Thanks!

0 Karma

Path Finder

The source types are configured by the app in the inputs.conf file. The instance of Flume managed by the app takes the protobuf data streamed from Dynatrace and writes it to specific locations on the filesystem. These locations are then ingested by Splunk and bucketed in the appropriate source type:

[monitor://$SPLUNK_HOME/etc/apps/compuwareapm/log/bt-export/pa]
disabled = false
index=dynatrace
time_before_close=60
sourcetype = pa

[monitor://$SPLUNK_HOME/etc/apps/compuwareapm/log/bt-export/pp]
disabled = false
index=dynatrace
time_before_close=60
sourcetype = pp

[monitor://$SPLUNK_HOME/etc/apps/compuwareapm/log/bt-export/visit]
disabled = false
index=dynatrace
time_before_close=60
sourcetype = visit

[monitor://$SPLUNK_HOME/etc/apps/compuwareapm/log/alerts]
disabled = false
followTail = 0
sourcetype = alert
index = dynatrace

View solution in original post

0 Karma
State of Splunk Careers

Access the Splunk Careers Report to see real data that shows how Splunk mastery increases your value and job satisfaction.

Find out what your skills are worth!