Splunk HTTP Event Collector (HEC) Destination
このページは日本語には対応しておりません。随時翻訳に取り組んでいます。翻訳に関してご質問やご意見ございましたら、お気軽にご連絡ください。
Use Observability Pipelines’ Splunk HTTP Event Collector (HEC) destination to send logs to Splunk HEC.
Setup
Set up the Splunk HEC destination and its environment variables when you set up a pipeline. The information below is configured in the pipelines UI.
Set up the destination
The following fields are optional:
- Enter the name of the Splunk index you want your data in. This has to be an allowed index for your HEC.
- Select whether the timestamp should be auto-extracted. If set to
true
, Splunk extracts the timestamp from the message with the expected format of yyyy-mm-dd hh:mm:ss
. - Set the
sourcetype
to override Splunk’s default value, which is httpevent
for HEC data.
Set the environment variables
- Splunk HEC token:
- The Splunk HEC token for the Splunk indexer.
- Stored in the environment variable
DD_OP_DESTINATION_SPLUNK_HEC_TOKEN
.
- Base URL of the Splunk instance:
- The Splunk HTTP Event Collector endpoint your Observability Pipelines Worker sends processed logs to. For example,
https://hec.splunkcloud.com:8088
.
Note: /services/collector/event
path is automatically appended to the endpoint. - Stored in the environment variable
DD_OP_DESTINATION_SPLUNK_HEC_ENDPOINT_URL
.
How the destination works
Event batching
A batch of events is flushed when one of these parameters is met. See event batching for more information.
Max Events | Max Bytes | Timeout (seconds) |
---|
None | 1,000,000 | 1 |