You can ship OpenTelemetry data via OpenTelemetry protocol (OTLP) using a combined endpoint for logs, metrics, and traces. This endpoint supports the gRPC protocol, but no other protocol formats of the OTLP specification.
Protocols like http/protobuf or http/json can be converted to gRPC using the OpenTelemetry Collector.
OpenTelemetry support in SAP Cloud Logging needs to be enabled with a service instance configuration parameter that can be set with service instance creation or update. Once enabled, all new service bindings and service keys contain the OTLP endpoint and credentials.
-
Enable Endpoint via Configuration Parameter.
OpenTelemetry ingestion must be enabled explicitly via the following in the service instance configuration:
{ "ingest_otlp:": { "enabled" "true" } }
After OpenTelemetry has been enabled, the endpoint is added to the service instance.
-
Retrieve Endpoint and Certificates.
Once OpenTelemetry ingestion is enabled, all new service bindings and service keys contain the required endpoint and credentials for mutual TLS. SAP Cloud Logging only supports mTLS for the OTLP endpoint. The service key contains the following OTLP-related properties:
{ "credentials": { "ingest-otlp-endpoint": "ingest-otlp-sf-<your-service-id>.<your-cluster-url>:443", "ingest-otlp-cert": "-----BEGIN CERTIFICATE-----\n Your client certificate in PEM format\n -----END CERTIFICATE-----\n", "ingest-otlp-key": "-----BEGIN PRIVATE KEY-----\n Your client key in PCKS #8 format\n -----END PRIVATE KEY-----\n", "server-ca": "-----BEGIN CERTIFICATE-----\n Your instance server certificate in PEM format\n -----END CERTIFICATE-----\n", } }
TLS certificates for client authentication are issued with a validity period of 90 days by default. Rotate the service key and update the credentials in all sender configurations, otherwise, ingestion will stop.
Ensure that you consider the SAP BTP Security Recommendation BTP-CLS-0003.
Use the
certValidityDays
to configure the validity period via a service binding parameter within the range of 1 to 180 days. For example, passing'{"ingest":{"certValidityDays":30}}
as the configuration parameter for binding creation sets the validity to 30 days.Deleting a binding doesn't revoke the corresponding certificate. Rotate the Ingestion Root CA Certificate if the root Certification Authority (Certification Authority) of your service instance expires soon, or the private key of a certificate was leaked.
-
Ship OpenTelemetry data with method of choice.
You can use the endpoint and credentials to ship OpenTelemetry signals retrieved by one of the following instrumentation options: OpenTelemetry SDK, OpenTelemetry Agent, or OpenTelemetry Collector. See OpenTelemetry documentation on instrumentation for more details.
You can analyze the ingested OpenTelemetry data in OpenSearch Dashboards (see Access and Analyze Observability Data). The index names match the requirements for the default analysis features of OpenSearch Dashboards. Indices match the following patterns:
logs-otel-v1-*
for logsmetrics-otel-v1-*
for metricsotel-v1-apm-span-*
for traces/spansotel-v1-apm-service-map
for the service map
Due to limitations of OpenSearch/Lucene, signal and resource attribute names have dots replaced with "@," and contain a prefix specifying the attribute type. For example, the resource attribute
service.name
is mapped toresource.attributes.service@name
. Because of its prominent role, the service name is also available as a fieldserviceName
, which reflects the open-source defaults.