diff --git a/SUMMARY.md b/SUMMARY.md index 0994d3b04..78ef6620c 100644 --- a/SUMMARY.md +++ b/SUMMARY.md @@ -178,6 +178,7 @@ * [Azure Log Analytics](pipeline/outputs/azure.md) * [Azure Logs Ingestion API](pipeline/outputs/azure_logs_ingestion.md) * [Counter](pipeline/outputs/counter.md) + * [Dash0](pipeline/outputs/dash0.md) * [Datadog](pipeline/outputs/datadog.md) * [Dynatrace](pipeline/outputs/dynatrace.md) * [Elasticsearch](pipeline/outputs/elasticsearch.md) diff --git a/administration/transport-security.md b/administration/transport-security.md index 4443cfd70..384ecdfdf 100644 --- a/administration/transport-security.md +++ b/administration/transport-security.md @@ -31,6 +31,7 @@ The following **output** plugins can take advantage of the TLS feature: * [Azure Data Explorer (Kusto)](../pipeline/outputs/azure_kusto.md) * [Azure Logs Ingestion API](../pipeline/outputs/azure_logs_ingestion.md) * [BigQuery](../pipeline/outputs/bigquery.md) +* [Dash0](../pipeline/outputs/dash0.md) * [Datadog](../pipeline/outputs/datadog.md) * [Elasticsearch](../pipeline/outputs/elasticsearch.md) * [Forward](../pipeline/outputs/forward.md) diff --git a/pipeline/outputs/dash0.md b/pipeline/outputs/dash0.md new file mode 100644 index 000000000..df6ef953c --- /dev/null +++ b/pipeline/outputs/dash0.md @@ -0,0 +1,63 @@ +--- +description: Send logs to Dash0 +--- + +# Dash0 + +Stream logs to [Dash0](https://www.dash0.com) by utilizing the **opentelemetry** plugin to send data to the Dash0 log ingress. + +## Configuration parameters + +| Key | Description | Default | +| -------------------------- | ----------- | ------- | +| `header` | The specific header for bearer authorization, where {your-Auth-token-here} is your Dash0 Auth Token. | Authorization Bearer {your-Auth-token-here} | +| `host` | Your Dash0 ingress endpoint. | `ingress.eu-west-1.aws.dash0.com` | +| `port` | TCP port of your Dash0 ingress endpoint. | `443` | +| `metrics_uri` | Specify an optional HTTP URI for the target web server listening for metrics | `/v1/metrics` | +| `logs_uri` | Specify an optional HTTP URI for the target web server listening for logs | `/v1/logs` | +| `traces_uri` | Specify an optional HTTP URI for the target web server listening for traces | `/v1/traces` | + +### TLS / SSL + +The opentelemetry output plugin supports TLS/SSL, for more details about the properties available and general configuration, please refer to the [TLS/SSL](../../administration/transport-security.md) section. + +## Getting started + +To get started with sending logs to Dash0: + +1. Get an [Auth Token](https://www.dash0.com/documentation/dash0/key-concepts/auth-tokens) from **Settings** > **Auth Tokens**. +1. In your main Fluent Bit configuration file, append the following `Output` section: + + {% tabs %} + {% tab title="fluent-bit.conf" %} + ```text + [OUTPUT] + Name opentelemetry + Match * + Host ingress.eu-west-1.aws.dash0.com + Port 443 + Header Authorization Bearer auth_vdOxPqcvSlBkhVQV95wU9TGXh2Fdjliq + Metrics_uri /v1/metrics + Logs_uri /v1/logs + Traces_uri /v1/traces + ``` + {% endtab %} + + {% tab title="fluent-bit.yaml" %} + ```yaml + [OUTPUT] + Name: opentelemetry + Match: * + Host: ingress.eu-west-1.aws.dash0.com + Port: 443 + Header: Authorization Bearer auth_vdOxPqcvSlBkhVQV95wU9TGXh2Fdjliq + Metrics_uri: /v1/metrics + Logs_uri: /v1/logs + Traces_uri: /v1/traces + ``` + {% endtab %} + {% endtabs %} + +## References + +- [Dash0 documentation](https://www.dash0.com/documentation/dash0) \ No newline at end of file diff --git a/vale-styles/FluentBit/Spelling-exceptions.txt b/vale-styles/FluentBit/Spelling-exceptions.txt index 2cbee98eb..7bcd9f212 100644 --- a/vale-styles/FluentBit/Spelling-exceptions.txt +++ b/vale-styles/FluentBit/Spelling-exceptions.txt @@ -25,6 +25,7 @@ coroutines Crowdstrike CRDs DaemonSet +Dash0 Datadog Datagen datapoint