|
3 | 3 | // * configuring/configuring-log-forwarding.adoc |
4 | 4 |
|
5 | 5 | :_mod-docs-content-type: PROCEDURE |
6 | | -[id="logging-forward-splunk_{context}"] |
7 | | -= Forwarding logs to Splunk |
| 6 | +[id="logging-forward-splunk-http-event-collector_{context}"] |
| 7 | += Forwarding logs to Splunk HTTP Event Collector |
8 | 8 |
|
9 | 9 | You can forward logs to the Splunk HTTP Event Collector (HEC). |
10 | 10 |
|
|
63 | 63 | <4> Specify the name of the secret that contains your HEC token. |
64 | 64 | <5> Specify the URL, including port, of your Splunk HEC. |
65 | 65 | <6> Specify the name of the index to send events to. If you do not specify an index, the default index of the splunk server configuration is used. This is an optional field. |
66 | | -<7> Specify the source of events to be sent to this sink. You can configure dynamic per-event values. This field is optional. |
67 | | -<8> Specify the fields to be added to the Splunk index. This field is optional. |
68 | | -<9> Specify the record field to be used as the payload. This field is optional. |
| 66 | +<7> Specify the source of events to be sent to this sink. You can configure dynamic per-event values. This field is optional. If you do not specify a value, the value of the field will be determined by the `log_type` and `log_source` values. For example, see link:https://docs.redhat.com/en/documentation/red_hat_openshift_logging/6.3/html-single/configuring_logging/index#default-splunk-metadata-key-values_configuring-log-forwarding[Default Splunk metadata key values]. |
| 67 | +<8> Specify the fields to be added to the Splunk index. This field is optional. The values are stored directly in the index alongside the raw event data, allowing for faster search performance on those fields. |
| 68 | +However, `indexed_fields` fields increase storage use. Use them only for high-value fields that provide significant search benefits, for example, large datasets with frequent queries on specific fields. |
| 69 | +You can use complex and nested fields as indexed fields. These are automatically transformed to meet Splunk's requirements. |
| 70 | +<9> Specify the record field to be used as the payload. |
| 71 | +By default, the `payloadKey` field is not set, which means the complete log record is forwarded as the payload. |
| 72 | +Use the `payloadKey` field carefully. Selecting a single field as the payload may cause other important information in the log to be dropped, potentially leading to inconsistent or incomplete log events. |
69 | 73 | <10> Specify the compression configuration, which can be either `gzip` or `none`. The default value is `none`. This field is optional. |
70 | 74 | <11> Specify the input names. |
71 | 75 | <12> Specify the name of the output to use when forwarding logs with this pipeline. |
|
0 commit comments