-
Notifications
You must be signed in to change notification settings - Fork 1.6k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
out_splunk: allow user to send raw message by setting Splunk_Send_Raw…
… On (#610) This patch adds a new toggle for the Splunk HTTP Event Collector output plugin to allow users to specify index, sourcetype and other top level fields when sending data to splunk. The current behaviour sends data to the main index by default. When enabling the feature, the user must take care to put all log details in the event field, and only specify fields known to splunk in the top level event. Example: Splunk_Send_Raw Off {"time": .., "event": {"k1": "foo", "k2": "bar", "index": "applogs"}} Splunk_Send_Raw On {"time": .., "k1": "foo", "k2": "bar", "index": "applogs"} For up to date information about the valid keys in the top level object, refer to the splunk documentation: http://docs.splunk.com/Documentation/Splunk/latest/Data/AboutHEC The patch has been tested using Splunk 6.6.1 Signed-off-by: Carl Henrik Lunde <[email protected]>
- Loading branch information
Showing
3 changed files
with
25 additions
and
7 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters