Content Modifier
The content_modifier processor allows you to manipulate the metadata/attributes and content of Logs and Traces.
Similar to the functionality exposed by filters, this processor presents a unified mechanism to perform such operations for data manipulation. The most significant difference is that processors perform better than filters, and when chaining them, there are no encoding/decoding performance penalties.
Note that processors and this specific component can only be enabled using the new YAML configuration format. Classic mode configuration format doesn't support processors.
Configuration Parameters
Key | Description |
---|---|
action | Define the operation to run on the target content. This field is mandatory; for more details about the actions available, check the table below. |
context | Specify which component of the Telemetry type will be affected. When processing Logs the following contexts are available: |
key | Specify the name of the key that will be used to apply the modification. |
value | Based on the action type, |
pattern | Defines a regular expression pattern. This property is only used by the |
converted_type | Define the data type to perform the conversion, the available options are: |
Actions
The actions specify the type of operation to run on top of a specific key or content from a Log or a Trace. The following actions are available:
Action | Description |
---|---|
insert | Insert a new key with a value into the target context. The |
upsert | Given a specific key with a value, the |
delete | Delete a key from the target context. The |
rename | Change the name of a key. The |
hash | Replace the key value with a hash generated by the SHA-256 algorithm, the binary value generated is finally set as an hex string representation. The |
extract | Allows to extact the value of a single key as a list of key/value pairs. This action needs the configuration of a regular expression in the |
convert | Convert the data type of a key value. The |
Insert example
The following example appends the key color
with the value blue
to the log stream.
Upsert example
Update the value of key1
and insert key2
:
Delete example
Delete key2
from the stream:
Rename example
Change the name of key2
to test
:
Hash example
Apply the SHA-256 algorithm for the value of the key password
:
Extract example
By using a domain address, perform a extraction of the components of it as a list of key value pairs:
Convert example
Both keys in the example are strings. Convert the key1
to a double/float type and key2
to a boolean:
Last updated