Ideal use cases include when you:
- leverage the Supported Sources and Supported Platforms listed below
- are looking for a single agent as opposed to managing multiple agents
- are having scale issues with FluentD on Kubernetes Collection
Avoid use cases that:
- are using an Unsupported Source or Unsupported Platform
- require remote management and remote configuration
- require Ingest Budgets
- require CPU target
Supported Platforms | Unsupported Platforms |
|
|
Supported Sources | Unsupported Sources |
|
|
The OpenTelemetry Collector offers two approaches for syslog processing:
- Syslog Receiver
- TCPlog/UDPlog Receiver and Sumo Logic Syslog Processor
Read this section to learn about the differences.
Syslog Receiver is a perfect solution if you are sending logs using a certain RFC protocol.
There are two supported formats: rfc3164
and rfc5424
.
Parsing is strict, if you send rfc5424
logs to the rfc3164
endpoint,
it will fail with an error and the log (and timestamp as well) won't be parsed.
For example, with the following configuration:
receivers:
syslog:
tcp:
listen_address: "0.0.0.0:54526"
protocol: rfc5424
exporters:
debug:
verbosity: detailed
service:
pipelines:
logs:
receivers: [syslog]
exporters: [debug]
and the following example logs:
<14>Apr 19 09:50:00 mymachineICIP su: RFC3164
<34>1 2021-04-09T07:54:14.001Z mymachine.example.com su - - - RFC5424 | TCP
it will produce the following logs:
...
2021-08-24T12:55:43.323+0200 error Failed to process entry {"kind": "receiver", "name": "syslog", "operator_id": "$..syslog_parser", "operator_type": "syslog_parser", "error": "expecting a version value in the range 1-999 [col 4]", "action": "send", "entry": {"timestamp":"2021-08-24T12:55:43.323699582+02:00","body":"<14>Apr 19 09:50:00 mymachineICIP su: RFC3164","severity":0}}
2021-08-24T12:55:43.374+0200 INFO loggingexporter/logging_exporter.go:71 LogsExporter {"#logs": 1}
2021-08-24T12:55:43.374+0200 DEBUG loggingexporter/logging_exporter.go:81 ResourceLog #0
InstrumentationLibraryLogs #0
InstrumentationLibrary
LogRecord #0
Timestamp: 2021-08-24 10:55:43.323699582 +0000 UTC
Severity: Undefined
ShortName:
Body: <14>Apr 19 09:50:00 mymachineICIP su: RFC3164
2021-08-24T12:55:55.173+0200 INFO loggingexporter/logging_exporter.go:71 LogsExporter {"#logs": 1}
2021-08-24T12:55:55.174+0200 DEBUG loggingexporter/logging_exporter.go:81 ResourceLog #0
InstrumentationLibraryLogs #0
InstrumentationLibrary
LogRecord #0
Timestamp: 2021-04-09 07:54:14.001 +0000 UTC
Severity: Error2
ShortName:
Body: {
-> appname: STRING(su)
-> facility: INT(4)
-> hostname: STRING(mymachine.example.com)
-> message: STRING(RFC5424 | TCP)
-> priority: INT(34)
-> version: INT(1)
}
...
This second approach is compatible with the current Installed Collector behavior.
It doesn't parse out the fields on the collector side,
but extracts the facility name and sends it as the Source Name
.
In addition, it doesn't verify the protocol of incoming logs,
so every format is treated the same.
For example, with the following configuration:
extensions:
sumologic:
installation_token: <token>
receivers:
tcplog:
listen_address: "0.0.0.0:54526"
add_attributes: true
processors:
sumologic_syslog: {}
groupbyattrs:
keys:
- net.peer.name
- facility
exporters:
sumologic:
## Set Source Name to facility name
source_name: "%{facility}"
## Set Source Host to client hostname
source_host: "%{net.peer.name}"
debug:
verbosity: detailed
service:
extensions: [sumologic]
pipelines:
logs:
receivers: [tcplog]
processors: [sumologic_syslog, groupbyattrs]
exporters: [debug, sumologic]
and the following example logs:
<14>Apr 19 09:50:00 mymachineICIP su: RFC3164
<34>1 2021-04-09T07:54:14.001Z mymachine.example.com su - - - RFC5424 | TCP
it will produce the following logs:
2021-08-24T13:18:41.464+0200 INFO loggingexporter/logging_exporter.go:71 LogsExporter {"#logs": 1}
2021-08-24T13:18:41.464+0200 DEBUG loggingexporter/logging_exporter.go:81 ResourceLog #0
Resource labels:
-> net.peer.name: STRING(localhost)
-> facility: STRING(user-level messages)
InstrumentationLibraryLogs #0
InstrumentationLibrary
LogRecord #0
Timestamp: 2021-08-24 11:18:41.394337919 +0000 UTC
Severity: Undefined
ShortName:
Body: <14>Apr 19 09:50:00 mymachineICIP su: RFC3164
Attributes:
-> net.transport: STRING(IP.TCP)
-> net.peer.ip: STRING(127.0.0.1)
-> net.peer.port: STRING(56790)
-> net.host.name: STRING(localhost)
-> net.host.ip: STRING(127.0.0.1)
-> net.host.port: STRING(54526)
2021-08-24T13:18:42.854+0200 INFO loggingexporter/logging_exporter.go:71 LogsExporter {"#logs": 1}
2021-08-24T13:18:42.854+0200 DEBUG loggingexporter/logging_exporter.go:81 ResourceLog #0
Resource labels:
-> net.peer.name: STRING(localhost)
-> facility: STRING(security/authorization messages)
InstrumentationLibraryLogs #0
InstrumentationLibrary
LogRecord #0
Timestamp: 2021-08-24 11:18:41.653010477 +0000 UTC
Severity: Undefined
ShortName:
Body: <34>1 2021-04-09T07:54:14.001Z mymachine.example.com su - - - RFC5424 | TCP
Attributes:
-> net.transport: STRING(IP.TCP)
-> net.peer.ip: STRING(127.0.0.1)
-> net.peer.port: STRING(56790)
-> net.host.name: STRING(localhost)
-> net.host.ip: STRING(127.0.0.1)
-> net.host.port: STRING(54526)
The Installed Collector and OpenTelemetry Collector have different codebases that cause some host metrics to have different names.
Use the translate_telegraf_attributes Sumo Logic Schema Processor option to keep metric names compatible with Sumo Logic Apps and consistent with the Installed Collector.
There may be differences between metric values calculated by the Installed Collector and OpenTelemetry Collector since they use different calculation formulas.
The following list has the metrics gathered by the Installed Collector that don't have equivalents in the OpenTelemetry Collector:
Mem_Used
Mem_PhysicalRam
TCP_InboundTotal
TCP_OutboundTotal
TCP_Idle
Disk_Queue
Disk_Available
The OpenTelemetry collector currently supports the following kinds of Windows data.
This receiver tails and parses logs from the windows event log API.
Field | Default | Description |
---|---|---|
channel |
required | The windows event log channel to monitor |
max_reads |
100 | The maximum number of records read into memory, before beginning a new batch |
start_at |
end |
On first startup, where to start reading logs from the API. Options are beginning or end |
poll_interval |
1s | The interval at which the channel is checked for new log entries. This check begins again after all new bodies have been read. |
attributes |
{} | A map of key: value pairs to add to the entry's attributes. |
resource |
{} | A map of key: value pairs to add to the entry's resource. |
operators |
[] | An array of operators. See below for more details |
raw |
false | If true, the windows events are not processed and sent as XML. |
storage |
none | The ID of a storage extension to be used to store bookmarks. Bookmarks allow the receiver to pick up where it left off in the case of a collector restart. If no storage extension is used, the receiver will manage bookmarks in memory only. |
For more information, please refer to the windows event log receiver readme.
This receiver, for Windows only, captures the configured system, application, or custom performance counter data from the Windows registry using the PDH interface. It is based on the Telegraf Windows Performance Counters Input Plugin
Memory\Committed Bytes
Processor\% Processor Time
, with a datapoint for eachInstance
label = (_Total
,1
,2
,3
, ... )
If one of the specified performance counters cannot be loaded on startup, a warning will be printed, but the application will not fail fast. It is expected that some performance counters may not exist on some systems due to different OS configuration.
The collection interval and the list of performance counters to be scraped can be configured:
windowsperfcounters:
collection_interval: <duration> # default = "1m"
metrics:
<metric name>:
description: <description>
unit: <unit type>
gauge:
<metric name>:
description: <description>
unit: <unit type>
sum:
aggregation: <cumulative or delta>
monotonic: <true or false>
perfcounters:
- object: <object name>
instances: [<instance name>]*
counters:
- name: <counter name>
metric: <metric name>
attributes:
<key>: <value>
For more information, please refer to the windows performance counter receiver readme.