diff --git a/pages/doc/2023-52.x_release_notes.md b/pages/doc/2023-52.x_release_notes.md
index f49eb707d..ed27730f4 100644
--- a/pages/doc/2023-52.x_release_notes.md
+++ b/pages/doc/2023-52.x_release_notes.md
@@ -40,7 +40,7 @@ Example: An annotated screenshot of the create traces security policy for origin
### Onboarded Subscriptions
-**New Admin Permission and Service Role**: With this release, we introduce the **Admin** [permission](csp_permissions_overview.html#operations-for-applications-permissions) and [service role](csp_users_roles.html#operations-for-applications-service-roles-built-in). **Admin** users can manage the Tanzu Observability organization settings.
+**New Admin Permission and Service Role**: With this release, we introduce the **Admin** [permission](csp_permissions_overview.html#tanzu-observability-permissions) and [service role](csp_users_roles.html#tanzu-observability-service-roles-built-in). **Admin** users can manage the Tanzu Observability organization settings.
### Original and Onboarded Subscriptions
diff --git a/pages/doc/csp_area_differences.md b/pages/doc/csp_area_differences.md
index 6b8ae6ccb..54ef04975 100644
--- a/pages/doc/csp_area_differences.md
+++ b/pages/doc/csp_area_differences.md
@@ -161,7 +161,7 @@ Last sentence: Тo temporarily enable service accounts for your service instance
For original subscriptions, using the Tanzu Observability REST API requires an API token associated with a user account or a service account. To generate API tokens for your user account you need the **API Tokens** permission. To generate API tokens for service accounts and to manage the API tokens in your Tanzu Observability organization, you need the **Accounts** permission.
-When your service is onboarded to VMware Cloud services and you want to access the Tanzu Observability REST API, you need a VMware Cloud services **access token**. In a few cases, when setting up a [limited list of integrations](integrations_onboarded_subscriptions.html#integrations-that-use-operations-for-applications-api-tokens), authentication with a Tanzu Observability API token is also supported. However, using a VMware Cloud services **access token** is the recommended way as we will deprecate the service accounts in the future. To obtain an **access token**, you can:
+When your service is onboarded to VMware Cloud services and you want to access the Tanzu Observability REST API, you need a VMware Cloud services **access token**. In a few cases, when setting up a [limited list of integrations](integrations_onboarded_subscriptions.html#integrations-that-use-tanzu-observability-api-tokens), authentication with a Tanzu Observability API token is also supported. However, using a VMware Cloud services **access token** is the recommended way as we will deprecate the service accounts in the future. To obtain an **access token**, you can:
* Generate a VMware Cloud services API token associated with your user account and exchange it for an access token.
@@ -366,7 +366,7 @@ For details, see Manage API Tokens.
All users can view and revoke their own VMware Cloud services API tokens. For details, see How do I manage my API tokens in the VMware Cloud services documentation.
Users with the VMware Cloud Organization Owner role can monitor the API tokens created in the organization and can set constraints for idle and maximum Time to live (TTL) for all newly created tokens. For details and instructions, see How do I manage API tokens in my Organization in the VMware Cloud services documentation.
How: As a user with the Proxies permission, you must configure the proxy to authenticate to Tanzu Observability with a Tanzu Observability API token that have the Proxies permission. For details, see Install a Proxy from the UI.
-
Note: The Wavefront proxy authenticates with a VMware Cloud services access token obtained from server to server OAuth app credentials or from a VMware Cloud services API token. Proxy authentication with a Tanzu Observability API token is still possible and supported only for a limited list of integrations.
+
Note: The Wavefront proxy authenticates with a VMware Cloud services access token obtained from server to server OAuth app credentials or from a VMware Cloud services API token. Proxy authentication with a Tanzu Observability API token is still possible and supported only for a limited list of integrations.
Who:
For proxy installation, users with the Proxies Tanzu Observability service role.
@@ -451,7 +451,7 @@ In both ways, the access token is directly issued to the proxy. For details, see
Where: In the Tanzu Observability user interface.
How: Follow the instructions on the Setup tab of the integration that you want to install.
-
Note: Most of the integrations that use a Wavefront proxy authenticate with a VMware Cloud services access token. A limited list of integrations still use proxy authentication with a Tanzu Observability API token.
+
Note: Most of the integrations that use a Wavefront proxy authenticate with a VMware Cloud services access token. A limited list of integrations still use proxy authentication with a Tanzu Observability API token.
Who: Users with the Proxies Tanzu Observability service role who must have one of the following:
A valid VMware Cloud services API token with the Proxies service role assigned.
diff --git a/pages/doc/csp_getting_started.md b/pages/doc/csp_getting_started.md
index fd146d3af..2369d9714 100644
--- a/pages/doc/csp_getting_started.md
+++ b/pages/doc/csp_getting_started.md
@@ -81,9 +81,9 @@ See [What organization roles are available in VMware Cloud Services](https://doc
## What Are Service Roles and Custom Roles?
-VMware Cloud services includes service-specific built-in roles, including [Tanzu Observability service roles](csp_users_roles.html#operations-for-applications-service-roles-built-in). A service role is required to grant certain access to the corresponding service instance in the organization.
+VMware Cloud services includes service-specific built-in roles, including [Tanzu Observability service roles](csp_users_roles.html#tanzu-observability-service-roles-built-in). A service role is required to grant certain access to the corresponding service instance in the organization.
-While the service roles are built-in and not editable, as a VMware Cloud **Organization Administrator** or **Organization Owner**, you can create [custom roles](csp_users_roles.html#create-edit-or-delete-a-custom-role) with service permissions of your choice, including [Operations for Application permissions](csp_permissions_overview.html#operations-for-applications-permissions). Custom roles are optional and apply to all service instances for which the target user or server to server app has at least one service role.
+While the service roles are built-in and not editable, as a VMware Cloud **Organization Administrator** or **Organization Owner**, you can create [custom roles](csp_users_roles.html#create-edit-or-delete-a-custom-role) with service permissions of your choice, including [Operations for Application permissions](csp_permissions_overview.html#tanzu-observability-permissions). Custom roles are optional and apply to all service instances for which the target user or server to server app has at least one service role.
## What's a Server to Server App?
diff --git a/pages/doc/csp_invite-AoA-users_tutorial.md b/pages/doc/csp_invite-AoA-users_tutorial.md
index 24f03138f..712280771 100644
--- a/pages/doc/csp_invite-AoA-users_tutorial.md
+++ b/pages/doc/csp_invite-AoA-users_tutorial.md
@@ -58,10 +58,10 @@ If do not have the VMware Cloud **Organization Owner** or **Organization Adminis
We provide a number of built-in Tanzu Observability service roles.
-- A corresponding service role for each [permission](csp_permissions_overview.html#operations-for-applications-permissions).
+- A corresponding service role for each [permission](csp_permissions_overview.html#tanzu-observability-permissions).
- Two special service roles - one that grants full administrative access to the service, and another one that grants read-only access to the service.
-For more information, see [Tanzu Observability Roles (Built-in)](csp_users_roles.html#operations-for-applications-service-roles-built-in).
+For more information, see [Tanzu Observability Roles (Built-in)](csp_users_roles.html#otanzu-observability-service-roles-built-in).
### Step 1: Enter the New User Details
diff --git a/pages/doc/csp_migration.md b/pages/doc/csp_migration.md
index f373269d0..9c4da3aeb 100644
--- a/pages/doc/csp_migration.md
+++ b/pages/doc/csp_migration.md
@@ -66,7 +66,7 @@ During the process of onboarding your Tanzu Observability service to VMware Clou
![An image displaying how users are migrated when your Tanzu Observability service is onboarded to VMware Cloud services. The information from the image is explained in the bullet list below.](images/csp-user-accounts-migration.png)
* If a user is a **Super Admin** in Tanzu Observability, we assign that user with the **Super Admin** Tanzu Observability service role in VMware Cloud services.
-* If a user is assigned with individual permissions in Tanzu Observability, we assign that user with the corresponding [Tanzu Observability service roles](csp_users_roles.html#operations-for-applications-service-roles-built-in) in VMware Cloud services. For example, if a user has the **Alerts** permission in Tanzu Observability, we assign that user with the **Alerts** Tanzu Observability service role in VMware Cloud services. There are the following exceptions:
+* If a user is assigned with individual permissions in Tanzu Observability, we assign that user with the corresponding [Tanzu Observability service roles](csp_users_roles.html#tanzu-observability-service-roles-built-in) in VMware Cloud services. For example, if a user has the **Alerts** permission in Tanzu Observability, we assign that user with the **Alerts** Tanzu Observability service role in VMware Cloud services. There are the following exceptions:
- The **Accounts** permission is replaced by the [VMware Cloud **Organization Administrator** role](csp_getting_started.html#whats-a-vmware-cloud-organization-role) plus the **Admin** Tanzu Observability service role.
- The **API Tokens** permission is not replaced by any role, because this privilege is not needed in VMware Cloud services. Each VMware Cloud services user can manage their own VMware Cloud services API tokens.
@@ -159,7 +159,7 @@ During the process of onboarding your Tanzu Observability service to VMware Clou
During the process of onboarding your Tanzu Observability service to VMware Cloud services, the service accounts **are not** migrated to VMware Cloud services, because VMware Cloud services supports [server to server OAuth apps](csp_server_to_server_apps.html), which are equivalent to the services accounts in Tanzu Observability.
-{% include warning.html content="The usage of service accounts in Tanzu Observability on VMware Cloud services is **restricted** to support only a [limited list of integrations](integrations_onboarded_subscriptions.html#integrations-that-use-operations-for-applications-api-tokens) that still authenticate with Tanzu Observability API tokens. We are in the process of updating all of our integrations to authenticate with VMware Cloud services access tokens. Service accounts and Tanzu Observability API tokens will be deprecated in the future."%}
+{% include warning.html content="The usage of service accounts in Tanzu Observability on VMware Cloud services is **restricted** to support only a [limited list of integrations](integrations_onboarded_subscriptions.html#integrations-that-use-tanzu-observability-api-tokens) that still authenticate with Tanzu Observability API tokens. We are in the process of updating all of our integrations to authenticate with VMware Cloud services access tokens. Service accounts and Tanzu Observability API tokens will be deprecated in the future."%}
For backward compatibility, all of your service accounts are **preserved** in Tanzu Observability as follows:
@@ -176,7 +176,7 @@ You should incrementally [replace](#how-to-replace-a-service-account-with-a-serv
### How to Replace a Service Account with a Server to Server App?
-Service accounts authenticate with Tanzu Observability API tokens, while server to server OAuth apps authenticate with the more secure VMware Cloud services access tokens. Service accounts are supported for a [limited list of integrations](integrations_onboarded_subscriptions.html#integrations-that-use-operations-for-applications-api-tokens) but will be deprecated in the future.
+Service accounts authenticate with Tanzu Observability API tokens, while server to server OAuth apps authenticate with the more secure VMware Cloud services access tokens. Service accounts are supported for a [limited list of integrations](integrations_onboarded_subscriptions.html#integrations-that-use-tanzu-observability-api-tokens) but will be deprecated in the future.
@@ -231,7 +231,7 @@ After onboarding to VMware Cloud services, you should incrementally replace your
Service Roles
-
Required for service access. Assign the Tanzu Observability service roles that correspond to the permissions of the service account that you want to replace.
+
Required for service access. Assign the Tanzu Observability service roles that correspond to the permissions of the service account that you want to replace.
If you already assigned a custom role, you must assign at least the Viewer Tanzu Observability service role.
@@ -264,15 +264,15 @@ You must exchange a VMware Cloud services API token or the credentials (ID and s
For backward compatibility, all of your API tokens are **preserved** in Tanzu Observability as follows:
* The Tanzu Observability API tokens associated with user accounts are **no longer** editable. The users can still use, view, and revoke their Tanzu Observability API tokens until they expire, but they **cannot** generate new ones.
-* The Tanzu Observability API tokens associated with service accounts are editable, because we still support them for a [limited list of integrations](integrations_onboarded_subscriptions.html#integrations-that-use-operations-for-applications-api-tokens).
+* The Tanzu Observability API tokens associated with service accounts are editable, because we still support them for a [limited list of integrations](integrations_onboarded_subscriptions.html#integrations-that-use-tanzu-observability-api-tokens).
-You should incrementally [replace](#how-to-replace-an-operations-for-applications-api-token-with-a-vmware-cloud-services-access-token) your Tanzu Observability API tokens with VMware Cloud services API tokens and server to server OAuth apps.
+You should incrementally [replace](#how-to-replace-an-tanzu-observability-api-token-with-a-vmware-cloud-services-access-token) your Tanzu Observability API tokens with VMware Cloud services API tokens and server to server OAuth apps.
{% include tip.html content="From now on, all users must generate VMware Cloud services API tokens for their accounts and exchange them for access tokens. Users with the VMware Cloud **Organization Owner**, **Organization Administrator**, or **Organization Member** with **Developer** roles can create server to server OAuth apps and exchange the app credentials for access tokens."%}
### How to View and Manage the Tanzu Observability API Tokens?
-Users with the **Admin** Tanzu Observability service role can [manage](csp_api_tokens.html#manage-the-operations-for-applications-api-tokens-in-your-service-instance) the Tanzu Observability API tokens in the service instance.
+Users with the **Admin** Tanzu Observability service role can [manage](csp_api_tokens.html#manage-the-tanzu-observability-api-tokens-in-your-service-instance) the Tanzu Observability API tokens in the service instance.
Each user can view and revoke their own Tanzu Observability API tokens:
@@ -285,7 +285,7 @@ Each user can view and revoke their own Tanzu Observability API tokens:
### How to Replace a Tanzu Observability API Token with a VMware Cloud Services Access Token?
-It's recommended to use Tanzu Observability API tokens only for a [limited list of integrations](integrations_onboarded_subscriptions.html#integrations-that-use-operations-for-applications-api-tokens). We will update these integrations to authenticate with VMware Cloud services access tokens in a future release.
+It's recommended to use Tanzu Observability API tokens only for a [limited list of integrations](integrations_onboarded_subscriptions.html#integrations-that-use-tanzu-observability-api-tokens). We will update these integrations to authenticate with VMware Cloud services access tokens in a future release.
@@ -354,7 +354,7 @@ To replace a Tanzu Observability API token associated with your user account:
1. Reconfigure your scripts, API calls, or proxies to exchange the newly generated VMware Cloud services API token for an access token, instead of using the Tanzu Observability API token.
{% include important.html content="The TTL of the access tokens associated with user accounts is 30 minutes. Make sure that your script renews the access token periodically before it expires. The Wavefront proxy does this automatically. "%}
-1. [Revoke](#how-to-view-and-manage-the-operations-for-applications-api-tokens) the Tanzu Observability API token that you replaced.
+1. [Revoke](#how-to-view-and-manage-the-tanzu-observability-api-tokens) the Tanzu Observability API token that you replaced.
@@ -366,11 +366,11 @@ To replace a Tanzu Observability API token associated with your user account:
During the process of onboarding your Tanzu Observability service to VMware Cloud services, all of the existing Wavefront proxies are **preserved** with their existing Tanzu Observability API tokens.
-You should incrementally [replace](#how-to-replace-the-operations-for-application-api-token-of-a-wavefront-proxy) the tokens of your proxies to authenticate with the more secure VMware Cloud services access tokens.
+You should incrementally [replace](#how-to-replace-the-tanzu-observability-api-token-of-a-wavefront-proxy) the tokens of your proxies to authenticate with the more secure VMware Cloud services access tokens.
-{% include tip.html content="From now on, the users with the **Proxies** service role can create and manage the proxies in your Tanzu Observability service. New proxies must authenticate with VMware Cloud services access tokens unless used for the [limited list of integrations](integrations_onboarded_subscriptions.html#integrations-that-use-operations-for-applications-api-tokens) that still authenticate with Tanzu Observability API tokens."%}
+{% include tip.html content="From now on, the users with the **Proxies** service role can create and manage the proxies in your Tanzu Observability service. New proxies must authenticate with VMware Cloud services access tokens unless used for the [limited list of integrations](integrations_onboarded_subscriptions.html#integrations-that-use-tanzu-observability-api-tokens) that still authenticate with Tanzu Observability API tokens."%}
-### How to Replace the Operations for Application API Token of a Wavefront Proxy?
+### How to Replace the Tanzu Observability API Token of a Wavefront Proxy?
{% include important.html content="Make sure the version of your Wavefront proxy is 13.0 or later."%}
@@ -395,7 +395,7 @@ You should incrementally [replace](#how-to-replace-the-operations-for-applicatio
```
cspAPIToken=
```
-1. [Revoke](#how-to-view-and-manage-the-operations-for-applications-api-tokens) the Tanzu Observability API token that you replaced.
+1. [Revoke](#how-to-view-and-manage-the-tanzu-observability-api-tokens) the Tanzu Observability API token that you replaced.
@@ -407,9 +407,9 @@ You should incrementally [replace](#how-to-replace-the-operations-for-applicatio
During the process of onboarding your Tanzu Observability service to VMware Cloud services, all of the existing integrations are **preserved** and continue to operate using proxy authentication with Tanzu Observability API tokens.
-You should incrementally [replace](#how-to-replace-the-operations-for-application-api-token-of-a-wavefront-proxy) the proxy tokens of your [integrations](integrations_onboarded_subscriptions.html#integrations-that-use-vmware-cloud-services-access-tokens) that are updated to use proxy authentication with the more secure VMware Cloud services access token.
+You should incrementally [replace](#how-to-replace-the-csp_migration.html-api-token-of-a-wavefront-proxy) the proxy tokens of your [integrations](integrations_onboarded_subscriptions.html#integrations-that-use-vmware-cloud-services-access-tokens) that are updated to use proxy authentication with the more secure VMware Cloud services access token.
-{% include tip.html content="From now on, the users with the **Proxies** and **Integrations** service roles can set up integrations in your Tanzu Observability service. New integrations must use proxy authentication with VMware Cloud services access tokens except for the [limited list of integrations](integrations_onboarded_subscriptions.html#integrations-that-use-operations-for-applications-api-tokens) that still authenticate with Tanzu Observability API tokens."%}
+{% include tip.html content="From now on, the users with the **Proxies** and **Integrations** service roles can set up integrations in your Tanzu Observability service. New integrations must use proxy authentication with VMware Cloud services access tokens except for the [limited list of integrations](integrations_onboarded_subscriptions.html#integrations-that-use-csp_migration.html-api-tokens) that still authenticate with Tanzu Observability API tokens."%}
diff --git a/pages/doc/csp_permissions_overview.md b/pages/doc/csp_permissions_overview.md
index 814f5ff07..94bd2f1e4 100644
--- a/pages/doc/csp_permissions_overview.md
+++ b/pages/doc/csp_permissions_overview.md
@@ -24,13 +24,13 @@ All users can:
* Share links to dashboards and charts with other users.
* Access the user profile from the gear icon on the toolbar.
-Users with the [**Super Admin** service role](csp_users_roles.html#operations-for-applications-service-roles-built-in) have full administrative access to the service.
+Users with the [**Super Admin** service role](csp_users_roles.html#tanzu-observability-service-roles-built-in) have full administrative access to the service.
## Tanzu Observability Permissions
VMware Cloud services allows users with the VMware Cloud **Organization Owner** and **Organization Administrator** roles to perform access control for object management based on Tanzu Observability permissions.
- Permissions can be assigned to roles only, and roles can be assigned to users, user groups, and server to server apps.
-- For each permission, there is a corresponding built-in [Tanzu Observability service role](csp_users_roles.html#operations-for-applications-service-roles-built-in) with only that permission assigned.
+- For each permission, there is a corresponding built-in [Tanzu Observability service role](csp_users_roles.html#tanzu-observability-service-roles-built-in) with only that permission assigned.
- Permissions can be assigned to [custom roles](csp_users_roles.html#create-edit-or-delete-a-custom-role).
diff --git a/pages/doc/csp_users_account_managing.md b/pages/doc/csp_users_account_managing.md
index 60cce83c6..284cd07b4 100644
--- a/pages/doc/csp_users_account_managing.md
+++ b/pages/doc/csp_users_account_managing.md
@@ -58,7 +58,7 @@ To view your roles, see what access you have to services, and request additional
## Enable or Disable Super Admin Mode
-If you hold the [**Super Admin** service role](csp_users_roles.html#operations-for-applications-service-roles-built-in), you can temporarily enable Super Admin mode and perform your Super Admin tasks.
+If you hold the [**Super Admin** service role](csp_users_roles.html#tanzu-observabilitys-service-roles-built-in), you can temporarily enable Super Admin mode and perform your Super Admin tasks.
{% include note.html content="To avoid making unintentional changes in the system, after performing your current Super Admin tasks, disable the Super Admin mode." %}
@@ -69,7 +69,7 @@ If you hold the [**Super Admin** service role](csp_users_roles.html#operations-f
As a result:
-
When the Super Admin mode is enabled, you have full administrative privileges for the Tanzu Observability service. See the Super Admin service role for details.
+
When the Super Admin mode is enabled, you have full administrative privileges for the Tanzu Observability service. See the Super Admin service role for details.
When the Super Admin mode is disabled, you have only the permissions from your other roles if any.
diff --git a/pages/doc/csp_users_roles.md b/pages/doc/csp_users_roles.md
index 5fba4575d..5478b18b3 100644
--- a/pages/doc/csp_users_roles.md
+++ b/pages/doc/csp_users_roles.md
@@ -41,7 +41,7 @@ The VMware Cloud Services Console **Roles** page lists all service roles and cus
### Tanzu Observability Service Roles (Built-in)
The VMware Cloud Services Console **Roles** page includes the following built-in Tanzu Observability service roles:
-- A corresponding Tanzu Observability service role for each [Tanzu Observability permission](csp_permissions_overview.html#operations-for-applications-permissions), that is, each of the following service roles has only one permission assigned:
+- A corresponding Tanzu Observability service role for each [Tanzu Observability permission](csp_permissions_overview.html#tanzu-observability-permissions), that is, each of the following service roles has only one permission assigned:
* **Admin**
* **Alerts**
@@ -87,7 +87,7 @@ The VMware Cloud Services Console **Roles** page includes the following built-in
### Create, Edit, or Delete a Custom Role
-Custom roles let you combine service permissions of your choice, for example, [Tanzu Observability permissions](csp_permissions_overview.html#operations-for-applications-permissions). A custom role can have permissions for one or multiple services in your organization. For example, you can have a custom role that grants administrative permissions for one service and read-only permissions for another service.
+Custom roles let you combine service permissions of your choice, for example, [Tanzu Observability permissions](csp_permissions_overview.html#tanzu-observability-permissions). A custom role can have permissions for one or multiple services in your organization. For example, you can have a custom role that grants administrative permissions for one service and read-only permissions for another service.
{% include important.html content="The Tanzu Observability permissions in a custom role apply to **all** Tanzu Observability service instances to which the target user account or server to server app has access. Therefore, to obtain the Tanzu Observability permissions from a custom role for a given Tanzu Observability service instance, the user account or server to server app assigned with that custom role must have at least one Operations to Applications service role for that service instance, for example, the **Viewer** service role."%}
@@ -115,7 +115,7 @@ For a [federated domain](csp_authentication.html#federated-domain-authentication
## Manage User Groups
-For efficient user management, you can create groups of users and assign roles to these groups. You can add new and existing users to a group. You can assign [service roles](#operations-for-applications-service-roles-built-in) and [custom roles](#create-edit-or-delete-a-custom-role) to a group.
+For efficient user management, you can create groups of users and assign roles to these groups. You can add new and existing users to a group. You can assign [service roles](#tanzu-observability-service-roles-built-in) and [custom roles](#create-edit-or-delete-a-custom-role) to a group.
See [How do I work with groups](https://docs.vmware.com/en/VMware-Cloud-services/services/Using-VMware-Cloud-Services/GUID-0BD8A07B-C3C0-4220-8CD0-18FA070D3DAD.html) in the VMware Cloud services documentation.
diff --git a/pages/doc/documentation_getting_started.md b/pages/doc/documentation_getting_started.md
index 43962f0e2..c3ba2c7f0 100644
--- a/pages/doc/documentation_getting_started.md
+++ b/pages/doc/documentation_getting_started.md
@@ -81,7 +81,7 @@ Our documentation includes reference documentation for API, query language, and
{{site.data.alerts.end}}
diff --git a/pages/doc/purchase-additional-capacity.md b/pages/doc/purchase-additional-capacity.md
index 36c126af5..9c303167a 100644
--- a/pages/doc/purchase-additional-capacity.md
+++ b/pages/doc/purchase-additional-capacity.md
@@ -8,7 +8,7 @@ summary: Learn how to add capacity to your current Tanzu Observability (formerly
---
{% include note.html content="Starting July 3, 2023, VMware Tanzu Observability is a service on the VMware Cloud services platform. For information about VMware Cloud services subscriptions and original subscriptions and the differences between them, see [Subscription Types](subscriptions-differences.html).
-- For VMware Cloud services subscriptions, to purchase additional capacity, you must hold the [**Organization Owner** role](csp_getting_started.html#whats-a-vmware-cloud-organization-role) in the VMware Cloud organization running the service as well as at least one [Tanzu Observability service role](csp_users_roles.html#operations-for-applications-service-roles-built-in) for the service instance. If your enterprise domain is federated, to access the organization billing account, you must have a VMware account linked to your corporate account.
+- For VMware Cloud services subscriptions, to purchase additional capacity, you must hold the [**Organization Owner** role](csp_getting_started.html#whats-a-vmware-cloud-organization-role) in the VMware Cloud organization running the service as well as at least one [Tanzu Observability service role](csp_users_roles.html#tanzu-observability-service-roles-built-in) for the service instance. If your enterprise domain is federated, to access the organization billing account, you must have a VMware account linked to your corporate account.
- For original Tanzu Observability subscriptions, to purchase additional capacity, you must be a **Super Admin** user."%}
## Supported Contracts
diff --git a/pages/doc/query_language_reference.md b/pages/doc/query_language_reference.md
index fde4506d4..ee5c0136e 100644
--- a/pages/doc/query_language_reference.md
+++ b/pages/doc/query_language_reference.md
@@ -191,7 +191,7 @@ lowpass(12ms, spans("beachshirts.styling.makeShirts"))
Query expressions use a number of common parameters to specify names and values that describe the data of interest. You can use [wildcards or partial regex](#partial-regex-wildcards-aliases-and-variables) to match multiple names or values.
-* Rules for valid names are here: [Data Format](wavefront_data_format.html#operations-for-applications-data-format-fields).
+* Rules for valid names are here: [Data Format](wavefront_data_format.html#tanzu-observability-data-format-fields).
* Enclose a metric, source, or tag name, or a tag value, in double quotes if it is also a reserved word in the product, such as a function name or keyword. For example, if you're using a point tag named `default`, use `"default"`.
diff --git a/pages/doc/start_trial.md b/pages/doc/start_trial.md
index ab2e179b3..a420b4ff4 100644
--- a/pages/doc/start_trial.md
+++ b/pages/doc/start_trial.md
@@ -55,7 +55,7 @@ VMware Cloud services provides provides single sign-on (SSO) and identity access
You are redirected to the Tanzu Observability GUI. You are logged with your VMware account.
- {% include note.html content="Initially, you have only the [**Viewer** Tanzu Observability service role](csp_users_roles.html#operations-for-applications-service-roles-built-in). As a VMware Cloud **Organization Owner**, you can [change your roles](csp_users_roles.html#manage-roles). It's recommended that when you start your free trial, you change your role to **Super Admin**. You can also add users to your service. See [Manage User Accounts](csp_user_management.html) for details." %}
+ {% include note.html content="Initially, you have only the [**Viewer** Tanzu Observability service role](csp_users_roles.html#tanzu-observability-service-roles-built-in). As a VMware Cloud **Organization Owner**, you can [change your roles](csp_users_roles.html#manage-roles). It's recommended that when you start your free trial, you change your role to **Super Admin**. You can also add users to your service. See [Manage User Accounts](csp_user_management.html) for details." %}
## Learn More!
* [Get Started with Tanzu Observability on VMware Cloud Services](csp_getting_started.html).
diff --git a/pages/doc/tracing_integrations.md b/pages/doc/tracing_integrations.md
index 0a7fa512d..2b45cfcac 100644
--- a/pages/doc/tracing_integrations.md
+++ b/pages/doc/tracing_integrations.md
@@ -4,22 +4,22 @@ keywords: data, distributed tracing, OpenTelemetry
tags: [tracing]
sidebar: doc_sidebar
permalink: tracing_integrations.html
-summary: Learn how to send trace data from Jaeger or Zipkin to VMware Aria Operations for Applications (formerly known as Tanzu Observability by Wavefront).
+summary: Learn how to send trace data from Jaeger or Zipkin to VMware Tanzu Observability (formerly known as VMware Aria Operations for Applications).
---
-{% include important.html content="OpenTracing is deprecated. ([OpenTracing](https://opentracing.io/) and [OpenCensus](https://opencensus.io/) have merged to form [OpenTelemetry](https://opentelemetry.io/).) To send trace data to Operations for Applications, use OpenTelemetry."%}
+{% include important.html content="OpenTracing is deprecated. ([OpenTracing](https://opentracing.io/) and [OpenCensus](https://opencensus.io/) have merged to form [OpenTelemetry](https://opentelemetry.io/).) To send trace data to Tanzu Observability, use OpenTelemetry."%}
-You can collect traces with Jaeger or Zipkin and send the trace data to Operations for Applications, which:
+You can collect traces with Jaeger or Zipkin and send the trace data to Tanzu Observability, which:
* Provides managed, highly scalable storage for your trace data.
* Allows you to examine and alert on RED metrics that are derived from the spans.
-Suppose you have already instrumented your application using Jaeger or Zipkin with OpenTracing or OpenTelemetry. You can continue using that system for application development, and then switch to using Operations for Applications by changing a few configuration settings.
+Suppose you have already instrumented your application using Jaeger or Zipkin with OpenTracing or OpenTelemetry. You can continue using that system for application development, and then switch to using Tanzu Observability by changing a few configuration settings.
{{site.data.alerts.note}}
-
You can use OpenTracing or OpenTelemetry to send traces to Operations for Applications using the Jaeger or Zipkin integration.
+
You can use OpenTracing or OpenTelemetry to send traces to Tanzu Observability using the Jaeger or Zipkin integration.
- The OpenTelemetry collector can identify data coming from applications instrumented with Jaeger or Zipkin and convert them to Open Telemetry format. Next, the Tanzu Observability (Wavefront) trace exporter converts the data to the Operations for Applications data format. See OpenTelemetry to configure your application.
+ The OpenTelemetry collector can identify data coming from applications instrumented with Jaeger or Zipkin and convert them to Open Telemetry format. Next, the Tanzu Observability (Wavefront) trace exporter converts the data to the Tanzu Observability data format. See OpenTelemetry to configure your application.
For OpenTracing, follow the steps given below.
@@ -39,11 +39,11 @@ To get data flowing:
Each integration
1. Configures your distributed tracing system to send trace data to a Wavefront proxy. During integration setup, follow the prompts to create a new integration or use an existing integration.
-2. The proxy processes the data and sends it to your Operations for Applications service.
+2. The proxy processes the data and sends it to your Tanzu Observabilityservice.
Part of setting up the integration is to configure the Wavefront proxy to listen for the trace data on an integration-specific port.
-Using an integration is the simplest way - [but not the only way](#alternatives-to-integrations) - to send trace data to Operations for Applications from a 3rd part tracing system.
+Using an integration is the simplest way - [but not the only way](#alternatives-to-integrations) - to send trace data to Tanzu Observabilityfrom a 3rd part tracing system.
## Trace Data from an Integration
@@ -55,7 +55,7 @@ The Wavefront proxy:
### Required Span Tags
-Operations for Applications requires certain [span tags](trace_data_details.html#span-tags) on well-formed spans. The following spans tags enable you to filter and visualize trace data from the different services in your instrumented application:
+Tanzu Observability requires certain [span tags](trace_data_details.html#span-tags) on well-formed spans. The following spans tags enable you to filter and visualize trace data from the different services in your instrumented application:
@@ -84,13 +84,13 @@ The proxy preserves any tags that you assigned through your distributed tracing
The mandatory span tags cannot have multiple values. Ensure that your application does not send spans with multiple application or service tags.
For example, a span with two span tags `service=notify` and `service=backend` is invalid.
-{% include note.html content="Operations for Applications ignores span tags with empty values." %}
+{% include note.html content="Tanzu Observability ignores span tags with empty values." %}
### Derived RED Metrics
-Operations for Applications automatically derives RED metrics from the spans that are sent from the instrumented application services. RED metrics are measures of the request Rate, Errors, and Duration that are obtained from the reported spans. These metrics are key indicators of the health of your services, and you can use them as context to help you discover problem traces.
+Tanzu Observability automatically derives RED metrics from the spans that are sent from the instrumented application services. RED metrics are measures of the request Rate, Errors, and Duration that are obtained from the reported spans. These metrics are key indicators of the health of your services, and you can use them as context to help you discover problem traces.
-Operations for Applications stores the RED metrics along with the spans they are based on. For more details, see [RED Metrics](trace_data_details.html#red-metrics).
+Tanzu Observability stores the RED metrics along with the spans they are based on. For more details, see [RED Metrics](trace_data_details.html#red-metrics).
{% include note.html content="The level of detail for the RED metrics is affected by any sampling that is done by your 3rd party distributed tracing system. See [Trace Sampling and RED Metrics from an Integration](#trace-sampling-and-red-metrics-from-an-integration), below." %}
@@ -250,11 +250,11 @@ Follow these steps:
## Alternatives to Integrations
-If using the Jaeger or Zipkin integration doesn't make sense in your environment, you can still use Operations for Applications with those systems.
+If using the Jaeger or Zipkin integration doesn't make sense in your environment, you can still use Tanzu Observability with those systems.
### Send Raw Trace Data
-We don't support an integration for your distributed tracing system, or if you are using your own proprietary tracing system, you can use a sender SDK to send raw trace data to Operations for Applications. With a sender SDK, you can write code that obtains the component values from your spans, and assembles those values into the [Operations for Applications span format](trace_data_details.html#operations-for-applications-span-format). The sender SDK also lets you configure your application to send the trace data to a Wavefront proxy or directly to Operations for Applications.
+We don't support an integration for your distributed tracing system, or if you are using your own proprietary tracing system, you can use a sender SDK to send raw trace data to Tanzu Observability. With a sender SDK, you can write code that obtains the component values from your spans, and assembles those values into the [Tanzu Observability span format](trace_data_details.html#tanzu-observability-span-format). The sender SDK also lets you configure your application to send the trace data to a Wavefront proxy or directly to Tanzu Observability.
For SDK setup details, see the [Sender SDK](wavefront_sdks.html#sdks-for-sending-raw-data) for your programming language.
@@ -262,7 +262,7 @@ For SDK setup details, see the [Sender SDK](wavefront_sdks.html#sdks-for-sending
### Use the Wavefront OpenCensus Go Exporter
-If you have instrumented your Go application with OpenCensus, you can use the [Wavefront OpenCensus Go Exporter](https://opencensus.io/exporters/supported-exporters/go/wavefront/) to push metrics, histograms, and traces into Operations for Applications. This exporter is built on the [Sender SDK](wavefront_sdks.html#sdks-for-sending-raw-data) for Go.
+If you have instrumented your Go application with OpenCensus, you can use the [Wavefront OpenCensus Go Exporter](https://opencensus.io/exporters/supported-exporters/go/wavefront/) to push metrics, histograms, and traces into Tanzu Observability. This exporter is built on the [Sender SDK](wavefront_sdks.html#sdks-for-sending-raw-data) for Go.
diff --git a/pages/doc/upgrade-and-purchase.md b/pages/doc/upgrade-and-purchase.md
index bd82cb11b..9c33511f8 100644
--- a/pages/doc/upgrade-and-purchase.md
+++ b/pages/doc/upgrade-and-purchase.md
@@ -28,7 +28,7 @@ Billing depends on the amount of data, measured in points per second (PPS), that
## Upgrade a Trial Service Instance on VMware Cloud Services
-{% include note.html content="To upgrade from a trial version, you must hold the [**Organization Owner** role](csp_getting_started.html#whats-a-vmware-cloud-organization-role) in the VMware Cloud organization running the service as well as at least one [Tanzu Observability service role](csp_users_roles.html#operations-for-applications-service-roles-built-in) for the service instance. If your enterprise domain is federated, to access the organization billing account, you must have a VMware account linked to your corporate account." %}
+{% include note.html content="To upgrade from a trial version, you must hold the [**Organization Owner** role](csp_getting_started.html#whats-a-vmware-cloud-organization-role) in the VMware Cloud organization running the service as well as at least one [Tanzu Observability service role](csp_users_roles.html#tanzu-observabilitys-service-roles-built-in) for the service instance. If your enterprise domain is federated, to access the organization billing account, you must have a VMware account linked to your corporate account." %}
1. Log in to your service instance.
1. On the banner showing you how many days have left from your trial period, click **Upgrade**.
diff --git a/pages/doc/wavefront_data_format.md b/pages/doc/wavefront_data_format.md
index c150315d5..7fd69bce3 100644
--- a/pages/doc/wavefront_data_format.md
+++ b/pages/doc/wavefront_data_format.md
@@ -149,7 +149,7 @@ Most of our discussion of the histogram and span data formats is on the pages li
### Span Data Format Syntax
-[The span format](trace_data_details.html#operations-for-applications-span-format) supports several predefined span tags.
+[The span format](trace_data_details.html#tanzu-observability-span-format) supports several predefined span tags.
```
source=