Docs » Available host and application monitors in Splunk Observability Cloud » Configure application receivers for hosts and servers » Collectd df

Collectd df 🔗

The Splunk Distribution of OpenTelemetry Collector uses the Smart Agent receiver with the Collectd df monitor type to track free disk space on the host using the collectd df plugin.

This integration is only available on Linux. Note a file system must be mounted in the same file system namespace that the agent is running in for this monitor to be able to collect statistics about that file system. This might be an issue when running the agent in a container.

Benefits 🔗

After you configure the integration, you can access these features:

Installation 🔗

Follow these steps to deploy this integration:

  1. Deploy the Splunk Distribution of OpenTelemetry Collector to your host or container platform:

  2. Configure the monitor, as described in the Configuration section.

  3. Restart the Splunk Distribution of OpenTelemetry Collector.

Configuration 🔗

To use this integration of a Smart Agent monitor with the Collector:

  1. Include the Smart Agent receiver in your configuration file.

  2. Add the monitor type to the Collector configuration, both in the receiver and pipelines sections.

Example 🔗

To activate this integration, add the following to your Collector configuration:

receivers:
  smartagent/collectd/df:
    type: collectd/df
    ... # Additional config

Next, add the monitor to the service.pipelines.metrics.receivers section of your configuration file:

service:
  pipelines:
    metrics:
      receivers: [smartagent/collectd/df]

Configuration settings 🔗

The following table shows the configuration options for the collectd/df monitor:

Option

Required

Type

Description

hostFSPath

no

string

Path to the root of the host file system. Useful when running in a container and the host filesystem is mounted in some subdirectory under /.

ignoreSelected

no

bool

If true, the file systems selected by fsTypes and mountPoints are excluded, and all others are included. The default value is true.

fsTypes

no

list of strings

The file system types to include or exclude. The default values is [aufs overlay tmpfs proc sysfs nsfs cgroup devpts selinuxfs devtmpfs debugfs mqueue hugetlbfs securityfs pstore binfmt_misc autofs].

mountPoints

no

list of strings

The mount paths to include or exclude, interpreted as a regular expression if surrounded by /. Note that you need to include the full path as the agent sees it, irrespective of the hostFSPath option. The default value is [/^/var/lib/docker/ /^/var/lib/rkt/pods/ /^/net// /^/smb//].

reportByDevice

no

bool

The default value is false.

reportInodes

no

bool

The default value is false.

valuesPercentage

no

bool

Whether true percent based metrics are reported. The default value is false.

Metrics 🔗

The following metrics are available for this integration:

Notes 🔗

  • To learn more about the available in Observability Cloud see Metric types.

  • In host-based subscription plans, default metrics are those metrics included in host-based subscriptions in Observability Cloud, such as host, container, or bundled metrics. Custom metrics are not provided by default and might be subject to charges. See Metric categories for more information.

  • In MTS-based subscription plans, all metrics are custom.

  • To add additional metrics, see how to configure extraMetrics in Add additional metrics.

Troubleshooting 🔗

If you are not able to see your data in Splunk Observability Cloud, try these tips:

  • Submit a case in the Splunk Support Portal.

    • Available to Splunk Observability Cloud customers

  • Call Splunk Customer Support

    • Available to Splunk Observability Cloud customers

  • Ask a question and get answers through community support at Splunk Answers.

    • Available to Splunk Observability Cloud customers and free trial users

  • Join the Splunk #observability user group Slack channel to communicate with customers, partners, and Splunk employees worldwide

To learn about even more support options, see Splunk Customer Success.