Adding Key Value Pairs from logback to Splunk automatically. #4866
Unanswered
djpimienta
asked this question in
Q&A
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hey Y'all,
I'm sure I'm missing something but I'm not sure I've got the right context to figure it out. Recently, our organization switched to using the otel-collector and splunk to display our logs.
We have some context that we include by adding to them to ILoggingEvents
which we could configure to be picked up by the logger:
%kvp{NONE}%n<>snip
and this all still works with our added properties being picked up by the logger and this was enough to have
Then we added the otel appender:
Our Dev Ops has an otel collector running with the following config for adding attributes which works:
We were led to believe that this would be enough to have these show up as attributes in Splunk.
However, this didn't happen and after reading the configs and documentation and I'm not sure if there is anyway to add more attributes without explicitly defining them(like 'fl_name' or 'otel_collector_gateway_pod') or in the collector config using OTEL_RESOURCE_ATTRIBUTES?
Is there a way to set attributes by looping through the json/a way to get all the added properties? Can someone point me to what I missed in the transform docs?
Beta Was this translation helpful? Give feedback.
All reactions