Interface SplunkLogDriverProps
- All Superinterfaces:
BaseLogDriverProps,software.amazon.jsii.JsiiSerializable
- All Known Implementing Classes:
SplunkLogDriverProps.Jsii$Proxy
@Generated(value="jsii-pacmak/1.119.0 (build 1634eac)",
date="2025-11-20T23:37:20.420Z")
@Stability(Stable)
public interface SplunkLogDriverProps
extends software.amazon.jsii.JsiiSerializable, BaseLogDriverProps
Specifies the splunk log driver configuration options.
Example:
Secret secret;
// Create a Task Definition for the container to start
Ec2TaskDefinition taskDefinition = new Ec2TaskDefinition(this, "TaskDef");
taskDefinition.addContainer("TheContainer", ContainerDefinitionOptions.builder()
.image(ContainerImage.fromRegistry("example-image"))
.memoryLimitMiB(256)
.logging(LogDrivers.splunk(SplunkLogDriverProps.builder()
.secretToken(secret)
.url("my-splunk-url")
.build()))
.build());
-
Nested Class Summary
Nested ClassesModifier and TypeInterfaceDescriptionstatic final classA builder forSplunkLogDriverPropsstatic final classAn implementation forSplunkLogDriverProps -
Method Summary
Modifier and TypeMethodDescriptionstatic SplunkLogDriverProps.Builderbuilder()default StringName to use for validating server certificate.default StringPath to root certificate.default SplunkLogFormatMessage format.default BooleangetGzip()Enable/disable gzip compression to send events to Splunk Enterprise or Splunk Cloud instance.default NumberSet compression level for gzip.default StringgetIndex()Event index.default StringIgnore server certificate validation.Splunk HTTP Event Collector token (Secret).default StringEvent source.default StringEvent source type.getUrl()Path to your Splunk Enterprise, self-service Splunk Cloud instance, or Splunk Cloud managed cluster (including port and scheme used by HTTP Event Collector) in one of the following formats: https://your_splunk_instance:8088 or https://input-prd-p-XXXXXXX.cloud.splunk.com:8088 or https://http-inputs-XXXXXXXX.splunkcloud.com.default BooleanVerify on start, that docker can connect to Splunk server.Methods inherited from interface software.amazon.awscdk.services.ecs.BaseLogDriverProps
getEnv, getEnvRegex, getLabels, getTagMethods inherited from interface software.amazon.jsii.JsiiSerializable
$jsii$toJson
-
Method Details
-
getSecretToken
Splunk HTTP Event Collector token (Secret).The splunk-token is added to the SecretOptions property of the Log Driver Configuration. So the secret value will not be resolved or viewable as plain text.
-
getUrl
Path to your Splunk Enterprise, self-service Splunk Cloud instance, or Splunk Cloud managed cluster (including port and scheme used by HTTP Event Collector) in one of the following formats: https://your_splunk_instance:8088 or https://input-prd-p-XXXXXXX.cloud.splunk.com:8088 or https://http-inputs-XXXXXXXX.splunkcloud.com. -
getCaName
Name to use for validating server certificate.Default: - The hostname of the splunk-url
-
getCaPath
Path to root certificate.Default: - caPath not set.
-
getFormat
Message format.Can be inline, json or raw.
Default: - inline
-
getGzip
Enable/disable gzip compression to send events to Splunk Enterprise or Splunk Cloud instance.Default: - false
-
getGzipLevel
Set compression level for gzip.Valid values are -1 (default), 0 (no compression), 1 (best speed) ... 9 (best compression).
Default: - -1 (Default Compression)
-
getIndex
Event index.Default: - index not set.
-
getInsecureSkipVerify
Ignore server certificate validation.Default: - insecureSkipVerify not set.
-
getSource
Event source.Default: - source not set.
-
getSourceType
Event source type.Default: - sourceType not set.
-
getVerifyConnection
Verify on start, that docker can connect to Splunk server.Default: - true
-
builder
- Returns:
- a
SplunkLogDriverProps.BuilderofSplunkLogDriverProps
-