Splunk Observability Cloud examples

Collection of examples for Splunk Observability Cloud.

Use the following examples to understand how to use Splunk Observability Cloud products and features to address your real-life goals. Use the tutorials to complete a series of tasks towards an end goal.

Category

Example

Global Splunk Observability Cloud example Troubleshoot an issue from the browser to the back end using Splunk Observability Cloud
Splunk Platform integration exampleTroubleshoot workflow failures with Log Observer Connect
OpenTelemetry exampleMonitor infrastructure and apps in a cloud environment using the Splunk OTel Collector

Splunk IT Service Intelligence integration

Troubleshoot faster with IT Service Intelligence and Splunk Observability Cloud

OpenTelemetry example

Monitor a Java service with OpenTelemetry in ECS Fargate

Alerts, detectors, and SLOs example

Create a detector to monitor server latency

Alerts, detectors, and SLOs example

Monitor system limits with AutoDetect

Alerts, detectors, and SLOs example

Find active alerts to investigate a CPU issue

Alerts, detectors, and SLOs example

Fix a detector that misfires alerts

Alerts, detectors, and SLOs example

Set a Min Delay for detectors to account for sparse data

Alerts, detectors, and SLOs example

Set a Max Delay for detectors to account for sudden changes in delay

Alerts, detectors, and SLOs example

Configure a service level objective (SLO) based on a Synthetics check

Alerts, detectors, and SLOs example

Investigate the root cause of an error with the Splunk APM service map

APM example

Troubleshoot an edge case by searching for a specific trace

APM example

Track how services impact Business Workflows

APM example

Find the root cause of an error using Tag Spotlight

APM example

Accelerate troubleshooting using Business Workflows on Tag Spotlight

APM example

Troubleshoot an issue to find the root cause using Trace Analyzer

APM example

Troubleshoot slow traces using Trace Analyzer

APM example

Monitor service performance using a built-in dashboard

APM example

Configure Business Workflows to track business KPIs

APM example

Monitor Business Workflows to measure business KPIs

APM example

Analyze historical data to optimize system performance using the built-in dashboard

APM example

Monitor detector service latency for a group of customers

APM example

Monitor service performance using endpoint performance

APM Database Query Performance example

Identify slow database queries using Database Query Performance

APM Database Query Performance example

Investigate Redis performance issues using Database Query Performance

APM Profiling example

Find performance issues using AlwaysOn Profiling

APM Profiling example

Analyze memory usage using AlwaysOn Profiling

Infrastructure Monitoring example

Troubleshoot a server failure using the Kubernetes navigator

Infrastructure Monitoring: Metrics pipeline management example

Combine aggregation and dropping rules to control your metric cardinality and volume

Infrastructure Monitoring: Metrics pipeline management example

Improve storage use and costs by routing and archiving your data

Infrastructure Monitoring: Network explorer example

Identify network problems affecting services

Infrastructure Monitoring: Network explorer example

Identify sources of high network transfer costs

Infrastructure Monitoring: Network explorer example

Examine upstream and downstream dependencies for a service update

RUM example

Identify performance bottlenecks with Splunk RUM for Browser

RUM example

Create custom events and monitor a single page application

RUM example

Find the root cause of a user-reported error in Splunk RUM for Mobile

Synthetic Monitoring example

Monitor a multi-step workflow using a Browser test

Synthetic Monitoring example

Monitor API performance for a critical workflow

Synthetic Monitoring example

Monitor the performance of a user-facing application

Synthetic Monitoring example

Compare run results to Web Vitals with Splunk RUM

Administer example

Maintain a secure organization using teams, tokens, and permissions