All Apps and Add-ons

Dynatrace Application Performance Management: Where to locate the source types?

romantic_warrio
New Member

The documentation ( https://community.dynatrace.com/community/display/DL/Splunk+Application ) says :

"By simply enabling the HTTP export of any Business Transactions you can now use them in splunk. The Splunk Application distinguishes between 4 source types
•pp - PurePath
•pa - PageAction (Client Action)
•visit - Visit
•alert - Alert"

I do see an index named "dynatrace" but not the source types. Does anyone know where they come from or their definitions?

Thanks

0 Karma
1 Solution

Dynatrace
Path Finder

The source types are configured by the app in the inputs.conf file. The instance of Flume managed by the app takes the protobuf data streamed from Dynatrace and writes it to specific locations on the filesystem. These locations are then ingested by Splunk and bucketed in the appropriate source type:

[monitor://$SPLUNK_HOME/etc/apps/compuwareapm/log/bt-export/pa]
disabled = false
index=dynatrace
time_before_close=60
sourcetype = pa

[monitor://$SPLUNK_HOME/etc/apps/compuwareapm/log/bt-export/pp]
disabled = false
index=dynatrace
time_before_close=60
sourcetype = pp

[monitor://$SPLUNK_HOME/etc/apps/compuwareapm/log/bt-export/visit]
disabled = false
index=dynatrace
time_before_close=60
sourcetype = visit

[monitor://$SPLUNK_HOME/etc/apps/compuwareapm/log/alerts]
disabled = false
followTail = 0
sourcetype = alert
index = dynatrace

View solution in original post

0 Karma

aaraneta_splunk
Splunk Employee
Splunk Employee

@romantic_warrior1 - Did the answer provided by Dynatrace help provide a working solution to your question? If yes, please don't forget to resolve this post by clicking "Accept". If no, please leave a comment with more feedback. Thanks!

0 Karma

Dynatrace
Path Finder

The source types are configured by the app in the inputs.conf file. The instance of Flume managed by the app takes the protobuf data streamed from Dynatrace and writes it to specific locations on the filesystem. These locations are then ingested by Splunk and bucketed in the appropriate source type:

[monitor://$SPLUNK_HOME/etc/apps/compuwareapm/log/bt-export/pa]
disabled = false
index=dynatrace
time_before_close=60
sourcetype = pa

[monitor://$SPLUNK_HOME/etc/apps/compuwareapm/log/bt-export/pp]
disabled = false
index=dynatrace
time_before_close=60
sourcetype = pp

[monitor://$SPLUNK_HOME/etc/apps/compuwareapm/log/bt-export/visit]
disabled = false
index=dynatrace
time_before_close=60
sourcetype = visit

[monitor://$SPLUNK_HOME/etc/apps/compuwareapm/log/alerts]
disabled = false
followTail = 0
sourcetype = alert
index = dynatrace

View solution in original post

0 Karma
Did you miss .conf21 Virtual?

Good news! The event's keynotes and many of its breakout sessions are now available online, and still totally FREE!