Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[receiver/splunkenterprise] Add scraping of two initial metrics #24800

Merged
merged 23 commits into from
Sep 13, 2023

Conversation

shalper2
Copy link
Contributor

@shalper2 shalper2 commented Aug 2, 2023

Description: First pass at implementing the component. This PR is primarily focused on implementing the components architecture with less focus on the collection of actual Splunk performance data. This was done to keep the PR relatively short. Considerable work has however been done to implement the receiver logic and accompanying tests.

Link to tracking Issue: 12667

Testing: Unit testing on each internal component

Documentation: README.md

@shalper2 shalper2 requested a review from MovieStoreGuy as a code owner August 2, 2023 16:11
@shalper2 shalper2 requested a review from a team August 2, 2023 16:11
@shalper2 shalper2 force-pushed the splunkent-client branch 7 times, most recently from ed3b209 to 9a15947 Compare August 9, 2023 13:14
func newSplunkEntClient(cfg *Config) splunkEntClient {
// tls party
tr := &http.Transport{
TLSClientConfig: &tls.Config{InsecureSkipVerify: true},
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

can we get this from the config instead? Does it have to be insecure always? Not a blocker but needs a follow up issue

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I agree with @atoulme , lets us the confighttp package to save needed to reimplement existing auth.

// auth header every time we make a new request
authString := fmt.Sprintf("%s:%s", cfg.Username, cfg.Password)
auth64 := base64.StdEncoding.EncodeToString([]byte(authString))
basicAuth := fmt.Sprintf("Basic %s", auth64)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

you could maybe do this via basicauth extension. A follow up also

@shalper2 shalper2 force-pushed the splunkent-client branch 3 times, most recently from 33d3f7f to a45c8aa Compare August 15, 2023 13:07
@shalper2 shalper2 requested a review from dmitryax September 12, 2023 21:54
@dmitryax dmitryax changed the title splunkent client [receiver/splunkenterprise] Add scraping of two initial metrics Sep 13, 2023
@dmitryax dmitryax merged commit a3eacd6 into open-telemetry:main Sep 13, 2023
@github-actions github-actions bot added this to the next release milestone Sep 13, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants