Docs ยป Supported integrations in Splunk Observability Cloud ยป Collector components: Receivers ยป Zipkin receiver

Zipkin receiver ๐Ÿ”—

The Zipkin receiver gathers spans from Zipkin versions 1 and 2. The supported pipeline type is traces. See Process your data with pipelines for more information.

Get started ๐Ÿ”—

Note

This component is included in the default configuration of the Splunk Distribution of the OpenTelemetry Collector when deploying in host monitoring (agent) mode. See Collector deployment modes for more information.

For details about the default configuration, see Configure the Collector for Kubernetes with Helm, Collector for Linux default configuration, or Collector for Windows default configuration. You can customize your configuration any time as explained in this document.

Follow these steps to configure and activate the component:

  1. Deploy the Splunk Distribution of the OpenTelemetry Collector to your host or container platform:

  1. Configure the Zipkin receiver as described in the next section.

  2. Restart the Collector.

Sample configuration ๐Ÿ”—

To activate the Zipkin receiver, add zipkin to the receivers section of your configuration file, as in the following sample configurations.

receivers:
  zipkin:
    endpoint: 0.0.0.0:9412

To complete the configuration, include the receiver in the traces pipeline of the service section of your configuration file. For example:

service:
  pipelines:
    traces:
      receivers: [zipkin]

The following settings are configurable:

  • endpoint: host:port on which the receiver is going to receive data. 0.0.0.0:9411 by default.

  • parse_string_tags: If enabled, the receiver attempts to parse string tags or binary annotations into int/bool/float. false by default.

Additional settings ๐Ÿ”—

The Zipkin receiver uses helper files for additional capabilities:

Settings ๐Ÿ”—

The following table shows the configuration options for the Zipkin receiver:

NameTypeDefaultDescription
endpointstringlocalhost:9411
tls (see fields)ptr

ServerConfig contains TLS configurations that are specific to server connections in addition to the common configurations. This should be used by components configuring TLS server connections.

cors (see fields)ptr
auth (see fields)ptr
max_request_body_sizeint64
include_metadataboolfalse
response_headersmap
compression_algorithmsslice
read_timeoutint64
read_header_timeoutint64
write_timeoutint64
idle_timeoutint64
parse_string_tagsboolfalse

If enabled the zipkin receiver will attempt to parse string tags/binary annotations into int/bool/float. Disabled by default

Fields of tls

NameTypeDefaultDescription
ca_filestring

Path to the CA cert. For a client this verifies the server certificate. For a server this verifies client certificates. If empty uses system root CA. (optional)

ca_pemstring

In memory PEM encoded cert. (optional)

include_system_ca_certs_poolboolfalse

If true, load system CA certificates pool in addition to the certificates configured in this struct.

cert_filestring

Path to the TLS cert to use for TLS required connections. (optional)

cert_pemstring

In memory PEM encoded TLS cert to use for TLS required connections. (optional)

key_filestring

Path to the TLS key to use for TLS required connections. (optional)

key_pemstring

In memory PEM encoded TLS key to use for TLS required connections. (optional)

min_versionstring

MinVersion sets the minimum TLS version that is acceptable. If not set, TLS 1.2 will be used. (optional)

max_versionstring

MaxVersion sets the maximum TLS version that is acceptable. If not set, refer to crypto/tls for defaults. (optional)

cipher_suitesslice

CipherSuites is a list of TLS cipher suites that the TLS transport can use. If left blank, a safe default list is used. See https://go.dev/src/crypto/tls/cipher_suites.go for a list of supported cipher suites.

reload_intervalint64

ReloadInterval specifies the duration after which the certificate will be reloaded If not set, it will never be reloaded (optional)

client_ca_filestring

Path to the TLS cert to use by the server to verify a client certificate. (optional) This sets the ClientCAs and ClientAuth to RequireAndVerifyClientCert in the TLSConfig. Please refer to https://godoc.org/crypto/tls#Config for more information. (optional)

client_ca_file_reloadboolfalse

Reload the ClientCAs file when it is modified (optional, default false)

Fields of cors

NameTypeDefaultDescription
allowed_originsslice
allowed_headersslice
max_ageint

Fields of auth

NameTypeDefaultDescription
authenticatorstruct

ID represents the identity for a component. It combines two values:

  • type - the Type of the component.
  • name - the name of that component. The component ID (combination type + name) is unique for a given component.Kind.
request_paramsslice

Troubleshooting ๐Ÿ”—

If you are a Splunk Observability Cloud customer and are not able to see your data in Splunk Observability Cloud, you can get help in the following ways.

Available to Splunk Observability Cloud customers

Available to prospective customers and free trial users

  • Ask a question and get answers through community support at Splunk Answers .

  • Join the Splunk #observability user group Slack channel to communicate with customers, partners, and Splunk employees worldwide. To join, see Chat groups in the Get Started with Splunk Community manual.

This page was last updated on Feb 11, 2025.