Menu
Public preview Open source

otelcol.receiver.splunkhec

Public preview: This is a public preview component. Public preview components are subject to breaking changes, and may be replaced with equivalent functionality that cover the same use case. The stability.level flag must be set to public-preview or below to use the component.

otelcol.receiver.splunkhec accepts events in the Splunk HEC format and forwards them to other otelcol.* components. The receiver accepts data formatted as JSON HEC events under any path or as EOL separated log raw data if sent to the raw_path path.

Note

otelcol.receiver.splunkhec is a wrapper over the upstream OpenTelemetry Collector splunkhec receiver. Bug reports or feature requests will be redirected to the upstream repository, if necessary.

You can specify multiple otelcol.receiver.splunkhec components by giving them different labels.

Usage

alloy
otelcol.receiver.splunkhec "<LABEL>" {
  output {
    metrics = [...]
    logs    = [...]
  }
}

Arguments

You can use the following arguments with otelcol.receiver.splunkhec:

NameTypeDescriptionDefaultRequired
access_token_passthroughbooleanIf enabled perserves incomming access token as a attribute com.splunk.hec.access_tokenfalseno
authcapsule(otelcol.Handler)Handler from an otelcol.auth component to use for authenticating requests.no
compression_algorithmslist(string)A list of compression algorithms the server can accept.["", "gzip", "zstd", "zlib", "snappy", "deflate", "lz4"]no
endpointstringhost:port to listen for traffic on."localhost:8088"no
health_pathstringThe path reporting health checks./services/collector/healthno
include_metadatabooleanPropagate incoming connection metadata to downstream consumers.no
max_request_body_sizestringMaximum request body size the server will allow.20MiBno
raw_pathstringThe path accepting raw HEC events. Only applies when the receiver is used for logs./services/collector/rawno
splittingstringDefines the splitting strategy used by the receiver when ingesting raw events. Can be set to “line” or “none”."line"no

By default, otelcol.receiver.splunkhec listens for HTTP connections on localhost:8088. To expose the HTTP server to other machines on your network, configure endpoint with the IP address to listen on, or 0.0.0.0:8088 to listen on all network interfaces.

If access_token_passthrough is enabled it will be preserved as a attribute com.splunk.hec.access_token. If logs or metrics are exported with otelcol.exporter.splunkhec it will check for this attribute and if present forward it with outgoing request.

Blocks

You can use the following blocks with otelcol.receiver.splunkhec:

BlockDescriptionRequired
outputConfigures where to send received telemetry data.yes
corsConfigures CORS for the HTTP server.no
[hec_metadata_to_otel_attrs][hec_metadata_to_otel_attrs]Configures OpenTelemetry attributes from HEC metadata.no
debug_metricsConfigures the metrics that this component generates to monitor its state.no
tlsConfigures TLS for the HTTP server.no

tls

The tls block configures TLS settings used for a server. If the tls block isn’t provided, TLS isn’t used for connections to the server.

The following arguments are supported:

NameTypeDescriptionDefaultRequired
ca_filestringPath to the CA file.no
ca_pemstringCA PEM-encoded text to validate the server with.no
cert_filestringPath to the TLS certificate.no
cert_pemstringCertificate PEM-encoded text for client authentication.no
include_system_ca_certs_poolbooleanWhether to load the system certificate authorities pool alongside the certificate authority.falseno
key_filestringPath to the TLS certificate key.no
key_pemsecretKey PEM-encoded text for client authentication.no
max_versionstringMaximum acceptable TLS version for connections."TLS 1.3"no
min_versionstringMinimum acceptable TLS version for connections."TLS 1.2"no
cipher_suiteslist(string)A list of TLS cipher suites that the TLS transport can use.[]no
reload_intervaldurationThe duration after which the certificate is reloaded."0s"no
client_ca_filestringPath to the TLS cert to use by the server to verify a client certificate.no
curve_preferenceslist(string)Set of elliptic curves to use in a handshake.[]no

If reload_interval is set to "0s", the certificate never reloaded.

The following pairs of arguments are mutually exclusive and can’t both be set simultaneously:

  • ca_pem and ca_file
  • cert_pem and cert_file
  • key_pem and key_file

If cipher_suites is left blank, a safe default list is used. Refer to the Go Cipher Suites documentation for a list of supported cipher suites.

client_ca_file sets the ClientCA and ClientAuth to RequireAndVerifyClientCert in the TLSConfig. Refer to the Go TLS documentation for more information.

The curve_preferences argument determines the set of elliptic curves to prefer during a handshake in preference order. If not provided, a default list is used. The set of elliptic curves available are X25519, P521, P256, and P384.

cors

The cors block configures CORS settings for an HTTP server.

The following arguments are supported:

NameTypeDescriptionDefaultRequired
allowed_headerslist(string)Accepted headers from CORS requests.["X-Requested-With"]no
allowed_originslist(string)Allowed values for the Origin header.no
max_agenumberConfigures the Access-Control-Max-Age response header.no

The allowed_headers specifies which headers are acceptable from a CORS request. The following headers are always implicitly allowed:

  • Accept
  • Accept-Language
  • Content-Type
  • Content-Language

If allowed_headers includes "*", all headers are permitted.

hec_metadata_to_otel_attrs

The hec_metadata_to_otel_attrs block configures OpenTelemetry attributes from HEC metadata.

NameTypeDescriptionDefaultRequired
hoststringSpecifies the mapping of the host field to a attribute.host.nameno
indexstringSpecifies the mapping of the index field to a attribute.com.splunk.indexno
sourcestringSpecifies the mapping of the source field to a attribute.com.splunk.sourceno
sourcetypestringSpecifies the mapping of the sourcetype field to a attribute.com.splunk.sourcetypeno

debug_metrics

The debug_metrics block configures the metrics that this component generates to monitor its state.

The following arguments are supported:

NameTypeDescriptionDefaultRequired
disable_high_cardinality_metricsbooleanWhether to disable certain high cardinality metrics.trueno

disable_high_cardinality_metrics is the Grafana Alloy equivalent to the telemetry.disableHighCardinalityMetrics feature gate in the OpenTelemetry Collector. It removes attributes that could cause high cardinality metrics. For example, attributes with IP addresses and port numbers in metrics about HTTP and gRPC connections are removed.

Note

If configured, disable_high_cardinality_metrics only applies to otelcol.exporter.* and otelcol.receiver.* components.

output

Required

The output block configures a set of components to forward resulting telemetry data to.

The following arguments are supported:

NameTypeDescriptionDefaultRequired
logslist(otelcol.Consumer)List of consumers to send logs to.[]no
metricslist(otelcol.Consumer)List of consumers to send metrics to.[]no

You must specify the output block, but all its arguments are optional. By default, telemetry data is dropped. Configure the metrics and logs arguments accordingly to send telemetry data to other components.

Exported fields

otelcol.receiver.splunkhec doesn’t export any fields.

Component health

otelcol.receiver.splunkhec is only reported as unhealthy if given an invalid configuration.

Debug information

otelcol.receiver.splunkhec doesn’t expose any component-specific debug information.

Example

This example forwards received telemetry through a batch processor before finally sending it to an OTLP-capable endpoint:

alloy
otelcol.receiver.splunkhec "default" {
  output {
    logs    = [otelcol.processor.batch.default.input]
    metrics = [otelcol.processor.batch.default.input]
  }
}

otelcol.processor.batch "default" {
  output {
    metrics = [otelcol.exporter.otlp.default.input]
    traces  = [otelcol.exporter.otlp.default.input]
  }
}

otelcol.exporter.otlp "default" {
  client {
    endpoint = sys.env("<OTLP_ENDPOINT>")
  }
}

Enable authentication

You can create a otelcol.receiver.splunkhec component that requires authentication for requests. This is useful for limiting who can push data to the server.

Note

Not all OpenTelemetry Collector authentication plugins support receiver authentication. Refer to the documentation for each otelcol.auth.* component to determine its compatibility.

alloy
otelcol.receiver.splunkhec "default" {
  output {
    logs    = [otelcol.processor.batch.default.input]
    metrics = [otelcol.processor.batch.default.input]
  }
  auth = otelcol.auth.basic.creds.handler
}

otelcol.auth.basic "creds" {
    username = sys.env("<USERNAME>")
    password = sys.env("<PASSWORD>")
}

Compatible components

otelcol.receiver.splunkhec can accept arguments from the following components:

Note

Connecting some components may not be sensible or components may require further configuration to make the connection work correctly. Refer to the linked documentation for more details.