On This Page

Home / Search/ Get Data In/ Add Sources/Ingest OpenTelemetry Data into Cribl Search

Ingest OpenTelemetry Data into Cribl Search

Collect metrics, traces, and logs from OTLP-compliant agents to store them in Cribl Search for fast analysis.


Before You Begin

You’ll need:

  • Cribl.Cloud Enterprise. For details, see Pricing.
  • A lakehouse engine. See how to get one at lakehouse engines.
  • Search Admin Permission, or higher. Learn who can do what at Cribl Search Permissions.
  • An OpenTelemetry agent or collector that can reach Cribl Search over HTTP(S).

You don’t need Cribl Stream, Edge, or Lake. (Looking for the OpenTelemetry (OTel) Source in Cribl Stream instead?)

1. Add an OpenTelemetry Source in Cribl Search

On the Cribl.Cloud top bar, select Products > Search > Data > Add Source > OpenTelemetry.

Describe Your Source and Set the Protocol

Under General, configure:

SettingDescriptionExample
IDSource ID, unique across your Cribl.Cloud Workspace.

Use letters, numbers, underscores, hyphens.
otel_prod
DescriptionDescribe your Source so others know what it’s for.Ingests OTLP from prod collectors
AddressHostname (FQDN) that your upstream sender connects to.

You’ll need this to set up your upstream sender.
search.main.foo-bar-abc123.cribl.cloud
PortNetwork port to listen on.

Keep the default unless it conflicts with another service.
4317 (gRPC default), 4318 (HTTP default)
OTLP versionVersion of the OTLP Protobuf spec to use.

Choose the version that matches your upstream sender.
1.3.1 (default)
ProtocolThe transport protocol to accept: gRPC (default) or HTTP.

Choose the protocol that matches your upstream sender.
gRPC (default)

Set up Authentication

Use authentication to make sure only authorized senders can push data to your Cribl Search Source.

Under Authentication, select the Authentication type you want to use:

NoneBasicBasic (Credentials Secret)Auth TokensAuth Token (Text Secret)

Set Up Encryption

Use TLS encryption to protect your data in transit between upstream senders and your Cribl Search Source.

Under Encrypt, select Enabled, and set the Minimum TLS version you want to accept.

TLS VersionWhen to Use
1.3Recommended. Provides the best security.
1.2Use only when connecting to older systems that don’t support TLS 1.3.
Older than 1.2Avoid if possible. These versions are no longer considered secure.

Select Save to create the Source.

2. Set Up Datatyping

Configure Datatype rules to parse, filter, and normalize your data into structured fields. We call this process Datatyping.

On the Cribl.Cloud top bar, select Products > Search > Data > Datatyping (auto). Here, you can:

See also:

3. Set Up Datasets and Dataset Rules

Configure Dataset rules to organize the parsed events into Datasets. This also determines how long the data is kept, as each Dataset has its own retention period.

On the Cribl.Cloud top bar, select Products > Search > Data > Datasets: Organize Your Data, and see Organize Your Data for details.

4. Set Up Your OpenTelemetry Sender

Configure your OpenTelemetry collector to export to the Source endpoint.

You’ll need these details from your Source configuration:

Name
Example
Addresssearch.main.foo-bar-abc123.cribl.cloud
Port4317 (gRPC default), 4318 (HTTP default)
Username / Password

Or, Token
otel_user / ********

420

Examples: OpenTelemetry > Cribl Search

Edit the OpenTelemetry agent or collector’s YAML configuration file, using the following example. For details, see OpenTelemetry docs.

Replace the example address (search.main.foo-bar-abc123.cribl.cloud), token, and port (if you changed the defaults 4317 for gRPC or 4318 for HTTP) with your Source values.

gRPCHTTPS

5. See Live Data Flow

Verify that events are successfully flowing from your upstream sender into Cribl Search.

On the Cribl.Cloud top bar, select Products > Search > Data > Live Data.

Here, check for your OpenTelemetry Source. For details, see See Live Data Flow.

Next Steps

Now that your data is in Cribl Search, you can start using it. For example: