Open jerome-kleinen-kbc-be opened 3 years ago
Thanks @jeromekleinen-kbc . I think you are right that these fields should be dropped from the event itself.
You may have already seen this, but encoding.except_fields
can be used as a workaround for now.
We have the same issue. Right now Splunk shows 2 values for indexed fields. It doesn't seem to affect querying though. So it just adds overhead for data ingestion.
Vector Version
Vector Configuration File
Debug Output
Expected Behavior
The official Splunk HEC output for fluentd removes fields labeled as indexed fields from the event itself, see https://github.com/splunk/fluent-plugin-splunk-hec#when-data_type-is-event so I take it this is the "official" way to threat indexed fields.
Actual Behavior
The fields marked as indexed fields are not removed from the raw event before sending the log to Splunk.
Example Data
Additional Context
By default this is also done for other metadata fields like host, source and sourcetype when using the
_key
variant, see https://github.com/splunk/fluent-plugin-splunk-hec#keep_keys-boolean-optionalVector currently supports the host_key parameter. The field set here is also not removed from the raw event.
References