Dynatrace Information Required
To install, navigate to Apps --> Manage Apps and select the “Install app from File” button. Specify the location of the file you downloaded and install it.
The Dynatrace Add-on for Splunk contains four distinct input types.
Each input requires you to specify the following:
Create a new Input for the data you wish to collect via the Inputs menu -> Create New Input option.
Once the Dynatrace Add-on for Splunk is installed and configured you can execute searches using:
Sourcecode can be found at the following Github Repository
-Updated eventtypes.conf that was creating incorrect entities in ITSI.
Added ability to disable SSL certificate verification (for Dynatrace Managed environments using self-signed certificates)
Corrected Add-on display name in Splunk
Added TA version header
Added mandatory HTTPS for API calls*
*If you are running a previous version you will need to reconfigure your Dynatrace tenant input.
Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.