New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
LOG-2988: Implement the output API to support sending logs to the Splunk #1605
Conversation
Skipping CI for Draft Pull Request. |
/test all |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/hold
if !hasTLS { | ||
return []Element{} | ||
} | ||
} else if secret != nil { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
dont think this is required either
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We really need to centralize this TLS logic somewhere.
@xperimental did you make any progress on that?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Look like a lot of duplication of TLS logic code, i did similar to Kafka config
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
did you make any progress on that?
Sadly, no. The plan was to move the logic into the security
package, so that outputs using the standard TLS options can benefit from de-duplication.
The kafka output is not a good example, because it does not actually use the standard TLS configuration of vector. I did not notice that in the original implementation, but my fix (#1591) is still not merged. The splink_hec
output does seem to use the standard TLS options, so you could start consolidating the TLS options in for example Elasticsearch and Splunk to get to a reusable package.
Another change i did in the linked PR is to remove the hasTLS
flag in the code and not make TLS dependent on the existence of a "secret" (passphrase, CA, certificate) but instead only on the used URL. I think this makes it more transparent to the user.
275e3cd
to
e461954
Compare
/refresh |
/test all |
/test lint |
3 similar comments
/test lint |
/test lint |
/test lint |
/test e2e |
2 similar comments
/test e2e |
/test e2e |
/test functional |
4 similar comments
/test functional |
/test functional |
/test functional |
/test functional |
/retest-required |
/retest |
3 similar comments
/retest |
/retest |
/retest |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/hold
/retest
Signed-off-by: Vitalii Parfonov <vparfono@redhat.com>
/hold cancel |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/test functional |
/retest-required |
/retest |
/test functional |
/retest-required |
/test functional |
@vparfonov: The following tests failed, say
Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. I understand the commands that are listed here. |
Signed-off-by: Vitalii Parfonov vparfono@redhat.com
Description
Add support for sending logs to Spunk (HTTP Event Collector) (https://docs.splunk.com/Documentation/Splunk/latest/Data/FormateventsforHTTPEventCollector)
splunk
in the Cluster Logging Forwarder APIDepends on PR ViaQ/vector#109 which will enable Splunk sink feature in Vector
/cc @vimalk78
/assign @jcantrill
/cherry-pick
Links