You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
### 3b- Kubernetes deployment with Dynatrace backend
66
+
67
+
> 🚨 If you want to send telemetry to [Dynatrace)](https://www.dynatrace.com), you'll need to follow the steps below, and skip [Step 3a](#3a---kubernetes-deployment-collector-stdout-only).
68
+
69
+
To send telemetry to Dynatrace, you will first need a [Dynatrace free trial account](https://www.dynatrace.com/signup/). You will also need to obtain an [access token](https://docs.dynatrace.com/docs/analyze-explore-automate/dynatrace-for-ai-observability/machine-learning-platforms/bedrock#create-a-dynatrace-token).
70
+
71
+
We're going to store the access token in a Kubernetes secret, and will map the secret to an environment variabe in the [`OpenTelemetryCollector CR`](https://github.com/avillela/otel-target-allocator-talk/main/src/resources/02-otel-collector-dt.yml#L17-L21).
72
+
73
+
First, create a secrets file for the Lightstep token.
Replace `<base64-encoded-LS-token>` with your own [access token] (https://docs.dynatrace.com/docs/discover-dynatrace/references/dynatrace-api/basics/dynatrace-api-authentication#create-token). Make sure you grant the correct permissions to your token so that you Dynatrace can ingest traces (`opentelemetryTrace.ingest`), logs (`logs.ingest`), and metrics (`metrics.ingest`). See [Dynatrace Token Scopes](https://docs.dynatrace.com/docs/discover-dynatrace/references/dynatrace-api/basics/dynatrace-api-authentication#token-scopes).
90
+
91
+
Replace `<base64-encoded-dynatrace-environment-identifier>` with your own environment ID. Your Dynatrace tenant will have a URL like this: `https://<dynatrace-environment-identifier>.apps.dynatrace.com`. The part before between `https://` and `apps.dynatrace.com` is what your environment identifier. Make sure you base64 encode that value before adding it to your `secrets` YAML.
92
+
93
+
Be sure to Base64 encode it like this:
94
+
95
+
```bash
96
+
echo<LS-access-token>| base64
97
+
```
98
+
99
+
Or you can Base64-encode it through [this website](https://www.base64encode.org/).
100
+
101
+
Finally, deploy the Kubernetes resources:
102
+
103
+
```bash
104
+
# Don't forget to pass the "dt" argument
105
+
./src/scripts/04-deploy-resources.sh dt
106
+
```
107
+
108
+
> For more on OTel Collector configuration with Dynatrace, check out [this doc](https://docs.dynatrace.com/docs/ingest-from/opentelemetry/collector/configuration).
109
+
110
+
### 3c- Kubernetes deployment with ServiceNow Cloud Observability backend
66
111
67
112
> 🚨 If you want to send telemetry to [ServiceNow Cloud Observability (formerly known as Lightstep)](https://www.servicenow.com/products/observability.html), you'll need to follow the steps below, and skip [Step 3a](#3a---kubernetes-deployment-collector-stdout-only).
68
113
@@ -73,7 +118,7 @@ We're going to store the access token in a Kubernetes secret, and will map the s
73
118
First, create a secrets file for the Lightstep token.
74
119
75
120
```bash
76
-
tee -a src/resources/00-secret.yaml <<EOF
121
+
tee -a src/resources/00-secret-ls.yaml <<EOF
77
122
apiVersion: v1
78
123
kind: Secret
79
124
metadata:
@@ -98,7 +143,8 @@ Or you can Base64-encode it through [this website](https://www.base64encode.org/
0 commit comments