Collect Kubernetes data
Integrate Kubernetes metrics, traces, logs, and events with Splunk Observability Cloud.
This page describes how to send Kubernetes metrics, traces, logs, and events to Splunk Observability Cloud using the Splunk Distribution of the OpenTelemetry Collector.
The Splunk Distribution of the OpenTelemetry Collector provides integrated collection and forwarding for all Kubernetes telemetry. By default, the Collector for Kubernetes is deployed using a Helm chart. In a Kubernetes cluster, the chart creates a Kubernetes DaemonSet as well as other Kubernetes objects.
Prerequisites
To collect Kubernetes data, you must meet the following requirements.
You have the admin role in Splunk Observability Cloud.
You are using a supported Kubernetes environment. This Kubernetes solution has been validated in Kubernetes environments that use Minikube, Amazon Elastic Kubernetes Service (Amazon EKS), and Google Kubernetes Engine. For more information, see Supported Kubernetes distributions.
You have created an organization access token and confirmed that it is active. You must use an organization token to authenticate emitters that send data points to Splunk Observability Cloud.
By default, organization access tokens are valid for one year. For access tokens created prior to February 28, 2022, the expiration date remains 5 years from the creation date. For more information, see Create and manage organization access tokens using Splunk Observability Cloud.
Collect Kubernetes data
Complete the following steps to collect Kubernetes data.
Install the Collector for Kubernetes using the guided setup:
From the Splunk Observability Cloud main menu, select .
Search for and select Kubernetes.
- Follow the on-screen instructions to install the Collector for Kubernetes.Note:
(Optional) For advanced installation instructions, see Install the Collector for Kubernetes using Helm.
Reset the default Log Observer Connect index to point to your Kubernetes events and logs destination:
Log on to Splunk Observability Cloud.
Go to Settings then Log Observer connections.
A list of your Log Observer Connect connections appears. Each connection is associated with a default Splunk platform index.
Select the three-dot menu next to the connection associated with the default index you want as the default searchable index in the Log Observer Connect UI, then select Make default from the drop-down list.
The index associated with the connection you select is the new default Splunk platform index that users can search in the Log Observer Connect UI.
Related pages
Next steps
After you collect Kubernetes data, you can Monitor Kubernetes.
Get data in | Monitor | Description |
|---|---|---|
Connect to the cloud service provider your Kubernetes clusters run in, if any. | ||
| Instrument back-end applications to send spans to Splunk APM | Collect metrics and spans from applications running in Kubernetes clusters. |