Reads events from HTTP requests with the body delimited by a new line.
Also, it emulates some protocols to allow receiving events from a wide range of software that use HTTP to transmit data.
E.g. file.d may pretend to be Elasticsearch allows clients to send events using Elasticsearch protocol.
So you can use Elasticsearch filebeat output plugin to send data to file.d.
⚠ Currently event commitment mechanism isn't implemented for this plugin. Plugin answers with HTTP code
OK 200right after it has read all the request body. It doesn't wait until events are committed.
Example: Emulating elastic through http:
pipelines:
example_k8s_pipeline:
settings:
capacity: 1024
input:
# define input type.
type: http
# pretend elastic search, emulate it's protocol.
emulate_mode: "elasticsearch"
# define http port.
address: ":9200"
actions:
# parse elastic search query.
- type: parse_es
# decode elastic search json.
- type: json_decode
# field is required.
field: message
output:
# Let's write to kafka example.
type: kafka
brokers: [kafka-local:9092, kafka-local:9091]
default_topic: yourtopic-k8s-data
use_topic_field: true
topic_field: pipeline_kafka_topic
# Or we can write to file:
# type: file
# target_file: "./output.txt"Setup:
# run server.
# config.yaml should contains yaml config above.
go run ./cmd/file.d --config=config.yaml
# now do requests.
curl "localhost:9200/_bulk" -H 'Content-Type: application/json' -d \
'{"index":{"_index":"index-main","_type":"span"}}
{"message": "hello", "kind": "normal"}
'address string default=:9200
An address to listen to. Omit ip/host to listen all network interfaces. E.g. :88
emulate_mode string default=no options=no|elasticsearch
Which protocol to emulate.
ca_cert string
CA certificate in PEM encoding. This can be a path or the content of the certificate. If both ca_cert and private_key are set, the server starts accepting connections in TLS mode.
private_key string
CA private key in PEM encoding. This can be a path or the content of the key. If both ca_cert and private_key are set, the server starts accepting connections in TLS mode.
auth AuthConfig
Auth config. Disabled by default. See AuthConfig for details. You can use 'warn' log level for logging authorizations.
meta cfg.MetaTemplates
Meta params
Add meta information to an event (look at Meta params) Use go-template syntax
Example: user_agent: '{{ index (index .request.Header "User-Agent") 0}}'
cors CORSConfig
CORS config.
Allowed origins support only one wildcard symbol. http://*.example.com - valid, http://*.example.*.com - invalid.
See CORSConfig for details.
header string default=Authorization
Override default Authorization header
strategy string default=disabled options=disabled|basic|bearer
AuthStrategy.Strategy describes strategy to use.
secrets map[string]string
AuthStrategy.Secrets describes secrets in key-value format.
If the strategy is basic, then the key is the login, the value is the password.
If the strategy is bearer, then the key is the name, the value is the Bearer token.
Key uses in the http_input_total metric.
login
remote_addr net.IP
request http.Request
params url.Values
request_uuid string
Generated using insane-doc