Search

Search

Certified
Enterprise Edition

Execute a Splunk search query

yaml
type: io.kestra.plugin.ee.splunk.events.Search
yaml
id: splunk_search
namespace: company.team

tasks:
  - id: search
    type: io.kestra.plugin.ee.splunk.events.Search
    host: michmed.splunkcloud.com
    token: "{{ secret('SPLUNK_TOKEN') }}"
    query: 'search index=main | head 100'
Properties
Default10000
Default3600
Definitions
allowFailedbooleanstring
Defaultfalse
allowedResponseCodesarray
SubTypeinteger
auth
type*Requiredobject
passwordstring
usernamestring
type*Requiredobject
tokenstring
type*Requiredobject
passwordstring
usernamestring
basicAuthPasswordDeprecatedstring
basicAuthUserDeprecatedstring
connectTimeoutDeprecatedstring
Formatduration
connectionPoolIdleTimeoutDeprecatedstring
Formatduration
defaultCharsetstring
DefaultUTF-8
followRedirectsbooleanstring
Defaulttrue
logLevelDeprecatedstring
Possible Values
ALLTRACEDEBUGINFOWARNERROROFFNOT_SPECIFIED
logsarray
SubTypestring
Possible Values
REQUEST_HEADERSREQUEST_BODYRESPONSE_HEADERSRESPONSE_BODY
maxContentLengthDeprecatedinteger
proxy
addressstring
passwordstring
portintegerstring
typestring
DefaultDIRECT
Possible Values
DIRECTHTTPSOCKS
usernamestring
proxyAddressDeprecatedstring
proxyPasswordDeprecatedstring
proxyPortDeprecatedinteger
proxyTypeDeprecatedstring
Possible Values
DIRECTHTTPSOCKS
proxyUsernameDeprecatedstring
readIdleTimeoutDeprecatedstring
Formatduration
readTimeoutDeprecatedstring
Formatduration
ssl
insecureTrustAllCertificatesbooleanstring
timeout
connectTimeoutstring
readIdleTimeoutstring
DefaultPT5M
DefaultJSON
Possible Values
JSONJSON_ROWSJSON_COLSCSVXMLRAW
Default2
Default8089
Defaulthttps
Formaturi