Windows Install Using ZIP with Bundled JRE
This page describes how to install Windows using ZIP with bundled JRE.
For some versions of Windows Server 2008 and Windows Vista, the Avg Read and Write Time disk metrics are reported as 0. This is due to a known Microsoft Windows bug. See Microsoft Knowledge Base. If this affects you, download the available hotfix. This refers to the following metrics:
Hardware Resources|Disks|<mount_point>|Avg Read Time (ms)Hardware Resources|Disks|<mount_point>|Avg Write Time (ms)
Windows Service Management (Combined Agent)
Starting from 26.3.0, the Windows installation process for the Machine Agent supports the deployment of the integrated Splunk OTel Collector. You can perform this installation by using the ZIP package with the bundled JRE.
Installation methods
You can install the Machine Agent and the Splunk OTel Collector using either system arguments or environment variables.
Using System Arguments (Sys Args)
You can use the InstallService.vbs script with specific flags to control the installation scope:
-
Machine Agent + OTel Collector:
cscript .\InstallService.vbs -Dsplunk.otel.enabled=true -Dsplunk.otel.token=<token> -Dsplunk.otel.realm=<realm> - Machine Agent Only:
cscript .\InstallService.vbs - OTel Collector Only:
cscript .\InstallService.vbs -Dsplunk.otel.only=true -Dsplunk.otel.token=<token> -Dsplunk.otel.realm=<realm>
Using Environment Variables
- Set the variables:
setx /M SPLUNK_OTEL_ONLY "true"(Optional: Use only for OTel-only mode)-
setx /M SPLUNK_OTEL_ENABLED "true" setx /M SPLUNK_ACCESS_TOKEN <token>setx /M SPLUNK_REALM <realm>
- Run the installation script:
cscript .\InstallService.vbs
Advanced Endpoint Override
By default, the installer derives the following endpoints from the Splunk realm:
SPLUNK_API_URL=https://api.<realm>.signalfx.comSPLUNK_INGEST_URL=https://ingest.<realm>.signalfx.com
If you need to override these endpoints, set them explicitly as machine-level environment variables along with other Splunk OTel configuration variables before running the installer:
setx /M SPLUNK_API_URL <api-url>setx /M SPLUNK_INGEST_URL <ingest-url>
Then run the installer: cscript .\InstallService.vbs
- These endpoint overrides are supported through environment variables only.
- There is no direct system-argument support for
SPLUNK_API_URL or SPLUNK_INGEST_URLin the current Windows installer script. - If
SPLUNK_API_URLorSPLUNK_INGEST_URLare set, they take precedence over values derived fromSPLUNK_REALMor-Dsplunk.otel.realm.
Post-Installation Steps
After the installation is complete, follow these steps to start and verify your services:
Start the OTel Collector Service: sc start splunk-otel-collector
Validate Service Status: Use the following commands to confirm that both services are installed and running correctly:
sc query "Appdynamics Machine Agent"sc query splunk-otel-collector
Install the Agent
- Before installing, see Install the Machine Agent.
- Install all available Windows updates.
- If you have not restarted your machine recently, you must restart it. Failure to do so may cause your machine to experience a CPU spike when you start the Machine Agent.
- Download and unzip the Windows ZIP bundle. Extract the contents to the agent installation directory
<machine_agent_home>. - Gather your configuration details and configure the agent by editing the <machine_agent_home>/conf/controller-info.xml file or by adding system properties to the JVM startup script file. See Plan the Machine Agent Configuration.
- (Required) Configure the Controller host name, port number, and account access key.
- (Required for Multi-Tenant Mode or SaaS installations) Configure the Agent Account Information. See Multi-Tenant Controller Accounts.
- (Optional) Review memory requirements. See Machine Agent Requirements and Supported Environments.
- (Optional) Configure the agent to use SSL. See Enable SSL for Machine Agent.
- (Optional) Configure the agent to use proxy settings. See Machine Agent Configuration Properties.
- (Optional) Determine if you need to specify an application name and tier name. See Machine Agent Installation Scenarios.However, if you are installing the Machine Agent on the same server with any APM app agent, do not specify the application name and tier name.
- Start the agent. If no
-Doptions are required on the command line, you can run the following.vbsscripts by selecting them from Windows Explorer.
Unquoted Service Path Enumeration Vulnerability
Unquoted Service Path Enumeration Vulnerability occurs when the remote Windows host has at least one service installed that uses an unquoted service path, which contains at least one whitespace. A local attacker can gain elevated privileges by inserting an executable file in the path of the affected service.
To address this vulnerability, perform either of the following methods.
Method 1 (recommended)
Open a terminal window and run the command <codeph>cscript <machine_agent_home>\InstallServiceWrapper.vbs <jvm_options></codeph>
This command installs the service.
InstallServiceWrapper.vbs script first runs InstallService.vbs (which performs the actual service installation) and then executes Windows_Path_Enumerate.ps1 (which is responsible for adding double quotes to the service path in the Windows Registry if there is a space in the service path).
Verification step: After installing the service, verify that the service path is correctly quoted by checking the Windows Registry at:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Services\Appdynamics Machine Agent
The ImagePath value should include double quotes, for example:
"C:\Program Files\AppDynamics\Machine Agent\bin\machine-agent.exe"
Method 2
-
Navigate to
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Services\Appdynamics Machine Agent. -
Change the
ImagePathdata value to encloseC:\Program Files\AppDynamics\AppD_Infra_Monitoring\bin\MachineAgentService.exein double quotation marks.Example:CODE"C:\Program Files\AppDynamics\AppD_Infra_Monitoring\bin\MachineAgentService.exe"
Method 3
-
Download the
Windows_Path_Enumerate.ps1script and save it to a folder. -
To list all vulnerabilities on the machine, open the powershell prompt and execute the following command:CODE
<path containing downloaded Windows_Path_Enumerate.ps1>\Windows_Path_Enumerate.ps1 -FixUninstall -FixEnv -WhatIf -
Fix all vulnerabilities on the machine by executing the following command:CODE
<path containing downloaded Windows_Path_Enumerate.ps1>\Windows_Path_Enumerate.ps1 -FixUninstall -FixEnv