You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: query-data/traces.mdx
+4
Original file line number
Diff line number
Diff line change
@@ -81,6 +81,8 @@ In Axiom, trace events are just like any other events inside datasets. This mean
81
81
82
82
To see how spans in a trace are related to each other, explore the trace in a waterfall view. In this view, each span in the trace is correlated with its parent and child spans.
83
83
84
+
### Traces in OpenTelemetry Traces dashboard
85
+
84
86
To explore spans within a trace using the OpenTelemetry Traces app, follow these steps:
85
87
86
88
1. Click the `Dashboards` tab.
@@ -97,6 +99,8 @@ To try out this example, go to the Axiom Playground.
97
99
98
100
[Run in Playground](https://play.axiom.co/axiom-play-qf1k/dashboards/otel.traces.otel-demo-traces)
99
101
102
+
### Traces in Query tab
103
+
100
104
To access the waterfall view from the Query tab, follow these steps:
101
105
102
106
1. Ensure the dataset you work with has trace data.
Copy file name to clipboardExpand all lines: reference/tokens.mdx
+3-3
Original file line number
Diff line number
Diff line change
@@ -13,15 +13,15 @@ This reference article explains how you can authenticate your requests to the Ax
13
13
You can use the Axiom API and CLI to programmatically ingest and query data, and manage settings and resources. For example, you can create new API tokens and change existing datasets with API requests. To prove that these requests come from you, you must include forms of authentication called tokens in your API requests. Axiom offers two types of tokens:
14
14
15
15
-[API tokens](#api-tokens) let you control the actions that can be performed with the token. For example, you can specify that requests authenticated with a certain API token can only query data from a particular dataset.
16
-
-[Personal access tokens (PATs)](#personal-access-tokens-pat) provide full control over your Axiom account. Requests authenticated with a PAT can perform every action you can perform in Axiom. When possible, avoid using PATs.
16
+
-[Personal access tokens (PATs)](#personal-access-tokens-pat) provide full control over your Axiom account. Requests authenticated with a PAT can perform every action you can perform in Axiom. When possible, use API tokens instead of PATs.
17
17
18
18
<Warning>
19
19
Keep tokens confidential. Anyone with these forms of authentication can perform actions on your behalf such as sending data to your Axiom dataset.
20
20
</Warning>
21
21
22
22
When working with tokens, use the principle of least privilege:
23
23
- Assign only those privileges to API tokens that are necessary to perform the actions that you want.
24
-
- When possible, avoid using PATs because they have full control over your Axiom account.
24
+
- When possible, use API tokens instead of PATs because PATs have full control over your Axiom account.
25
25
26
26
For more information on how to use tokens in API requests, see [Get started with Axiom API](/restapi/introduction).
27
27
@@ -75,7 +75,7 @@ To regenerate an advanced API token, follow these steps:
75
75
76
76
## Personal access tokens (PAT)
77
77
78
-
Personal access tokens (PATs) provide full control over your Axiom account. Requests authenticated with a PAT can perform every action you can perform in Axiom. When possible, avoid using PATs.
78
+
Personal access tokens (PATs) provide full control over your Axiom account. Requests authenticated with a PAT can perform every action you can perform in Axiom. When possible, use API tokens instead of PATs.
Copy file name to clipboardExpand all lines: restapi/introduction.mdx
+1-1
Original file line number
Diff line number
Diff line change
@@ -49,7 +49,7 @@ Encode the body of API requests as JSON objects and set the `Content-Type` heade
49
49
To prove that API requests come from you, you must include forms of authentication called tokens in your API requests. Axiom offers two types of tokens:
50
50
51
51
-[API tokens](/reference/tokens#api-tokens) let you control the actions that can be performed with the token. For example, you can specify that requests authenticated with a certain API token can only query data from a particular dataset.
52
-
-[Personal access tokens (PATs)](/reference/tokens#personal-access-tokens-pat) provide full control over your Axiom account. Requests authenticated with a PAT can perform every action you can perform in Axiom. When possible, avoid using PATs.
52
+
-[Personal access tokens (PATs)](/reference/tokens#personal-access-tokens-pat) provide full control over your Axiom account. Requests authenticated with a PAT can perform every action you can perform in Axiom. When possible, use API tokens instead of PATs.
53
53
54
54
If you use an API token for authentication, include the API token in the `Authorization` header.
0 commit comments