Dynatrace Information Required
To install, navigate to Apps --> Manage Apps and select the “Install app from File” button. Specify the location of the file you downloaded and install it.
The Dynatrace Add-on for Splunk contains four distinct input types.
Each input requires you to specify the following:
Create a new Input for the data you wish to collect via the Inputs menu -> Create New Input option.
Once the Dynatrace Add-on for Splunk is installed and configured you can execute searches using:
Sourcecode can be found at the following Github Repository
1. This is the first release with Python3 support for Splunk v8.x and beyond. It will continue to work with Python2 as well.
-Updated eventtypes.conf that was creating incorrect entities in ITSI.
Added ability to disable SSL certificate verification (for Dynatrace Managed environments using self-signed certificates)
Corrected Add-on display name in Splunk
Added TA version header
Added mandatory HTTPS for API calls*
*If you are running a previous version you will need to reconfigure your Dynatrace tenant input.
Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.