Cloudflare
Prerequisites
Cloudflare Enterprise plan
Publicly signed CA certificate
Follow the OpenTelemetry receiver documentation getting started section for help configuring Cloudflare LogPush jobs.
Supported Platforms
Linux
✓
Windows
✓
macOS
✓
Kubernetes Gateway
✓
OpenShift 4 Node (DaemonSet)
✓
Configuration Table
listen_address
string
0.0.0.0
The IP address to listen on. The collector must be available on the internet in order to receive logs from Cloudflare.
https_port
int
8443
TCP port to receive incoming uploads from the LogPush job(s).
enable_tls
bool
true
Whether or not to use TLS.
cert_file
string
A TLS certificate used to encrypt communications on the listening server. Cloudflare requires that this certificate be signed by a public certificate authority. If TLS is enabled.
key_file
string
A TLS private key used to encrypt communications on the listening server. Cloudflare requires TLS. If TLS is enabled.
mutual_tls
bool
false
Whether of not to use Mutual TLS
ca_file
string
Certificate authority used to validate the OTLP server's TLS certificate. If Mutual TLS is enabled.
secret
string
String used to validate that messages are coming from an expected source. If set, it must be also be configured in the LogPush job's destination field: "destination_conf": "https://example.com?header_X-CF-Secret=abcd1234"
attributes
map
Any Cloudflare LogPush field names provided as keys will be mapped to attributes using the map value as the attribute name.
timestamp_field
string
EdgeStartTimestamp
The name of the field that should be parsed to represent the Timestamp of the log record.
Kubernetes
When using this source with Kubernetes or OpenShift, you must create a custom Service resource to route traffic to the collector. See the Kubernetes Service for more information.
External Documentation
Last updated
Was this helpful?