server_created
._time
will be filtered out of the result. Any other fields present in the result will be mapped to tags in the format field
:value
._time
field.hostname:<hostname>
status:<status>
description:<description>
/etc/sts-agent/conf.d/splunk_events.yaml
."events.*"
."search"
.10
.5
.1
.1000
.0
.86400
.3600
.force_dispatch: true
and dispatch.now: true
.stackstate-generic-events
data source. This can be mapped to associated components._bkt
and _cd
. This behavior can be customized for each saved search by specifying unique_key_fields
in the Splunk events Agent check configuration. Note that the specified unique_key_fields
fields are mandatory fields for each record returned by the Splunk saved search.unique_key_fields: []
(an empty list).stackstate-generic-events
data source. This can be mapped to associated components.