Downloads
Dynatrace Information Required
To install, navigate to Apps --> Manage Apps and select the “Install app from File” button. Specify the location of the file you downloaded and install it.
The Dynatrace Add-on for Splunk contains four distinct input types.
Each input requires you to specify the following:
Create a new Input for the data you wish to collect via the Inputs menu -> Create New Input option.
Once the Dynatrace Add-on for Splunk is installed and configured you can execute searches using:
sourcetype="dynatrace:*"
Full change log:
https://github.com/dconnett-splunk/splunk-add-on-for-dynatrace/compare/v2.1.5...v2.1.6
V2 API is now located under two input types
1. Dynatrace API Version 2
2. Dynatrace Timeseries Metrics API v2
Once you create an API Version 2 Input, you can select which endpoint you want to collect from.
Added support for custom certificate verification add your RootCA certificate to $SPLUNK_HOME/etc/apps/$DynatraceAddOn/local/cert.pem
Bugs fixed:
* Missing data for paged results
* Fixed issue where Dynatrace Collection Interval
for metricsV2 would always pull 2 hours of data, regardless of time set by user.
* This will reduce data usage drastically for metrics
* Proxy settings not respected for v2 Endpoints.
* Timezone calculations inconsistent use of UTC vs local.
Changes for 2.0
Added Support for Dynatrace APIv2 for the following Endpoints:
* Metrics
* Entities
* Events
* Problems
* Synthetic Locations
Known Issues:
Entities do not contain all information
*WARNING READ BEFORE UPGRADING to 1.2.x*
We are changed the way the Dynatrace Add-on for Splunk stores credentials in 1.2.x. It now uses a centralized storage methodology.
If upgrading from versions previous to 1.2, you will need to reconfigure all of your inputs after upgrading to this release.
Step 1: Navigate to "Dynatrace Add-on" -> "Configuration" -> "Add Account" (Add your Dynatrace tenant and token here)
Step 2: Navigate to "Dynatrace Add-on" -> "Inputs"
Step 3: For each input click "Actions" -> "Edit" -> Select your new Dynatrace Account defined in Step 1.
Changes for 1.2.2
Added knowledge objects from the Dynatrace App
Added compatibility for the Splunk APM Content Pack
*WARNING READ BEFORE UPGRADING to 1.2*
We are changing the way the Dynatrace Add-on for Splunk stores credentials in this build. It now uses a centralized storage methodology.
You will need to reconfigure all of your inputs after upgrading to this release.
Step 1: Navigate to "Dynatrace Add-on" -> "Configuration" -> "Add Account" (Add your Dynatrace tenant and token here)
Step 2: Navigate to "Dynatrace Add-on" -> "Inputs"
Step 3: For each input click "Actions" -> "Edit" -> Select your new Dynatrace Account defined in Step 1.
Removed indexes.conf for cloud certification.
Resolved file permissions.
-Updated eventtypes.conf that was creating incorrect entities in ITSI.
Added ability to disable SSL certificate verification (for Dynatrace Managed environments using self-signed certificates)
Corrected Add-on display name in Splunk
Added TA version header
Added mandatory HTTPS for API calls
If you are running a previous version you will need to reconfigure your Dynatrace tenant input.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.