The updateEventForwardingRule() GraphQL mutation is used to update an event forwarding rule on a repository in LogScale and return it.

To create an event forwarding rule, you can use the createEventForwardingRule() mutation. You can use deleteEventForwardingRule() to delete one.

Hide Query Example

Show Event Forwarding Rules Query

For more information on event forwarding rules, see the Event Forwarding Rules documentation page. You may also want to look at the Event Forwarding and the Events page for related information.

API Stability Long-Term

Syntax

graphql
updateEventForwardingRule(
     input: UpdateEventForwardingRule!
   ): EventForwardingRule!

For the input, you'll have to give the name of the repository, the identifier of the event forwarding rule, the query string for filtering and mapping events, and whatever else you want to update. Click on Show Query above to find the identifier.

For the results, you can get details for the event forwarding rule as configuration. See the Returned Datatype section for what will be available.

Example

Raw
graphql
mutation {
  updateEventForwardingRule( input:
     { repoName: "humio",
       id: "abc123"
       queryString: "@host=localhost",
       eventForwarderId: "def456",
       languageVersion: legacy
    } 
  )
  { id }
}
Mac OS or Linux (curl)
shell
curl -v -X POST $YOUR_LOGSCALE_URL/graphql \
    -H "Authorization: Bearer $TOKEN" \
    -H "Content-Type: application/json" \
    -d @- << EOF
{"query" : "mutation {
  updateEventForwardingRule( input:
     { repoName: \"humio\",
       id: \"abc123\"
       queryString: \"@host=localhost\",
       eventForwarderId: \"def456\",
       languageVersion: legacy
    } 
  )
  { id }
}"
}
EOF
Mac OS or Linux (curl) One-line
shell
curl -v -X POST $YOUR_LOGSCALE_URL/graphql \
    -H "Authorization: Bearer $TOKEN" \
    -H "Content-Type: application/json" \
    -d @- << EOF
{"query" : "mutation {
  updateEventForwardingRule( input:
     { repoName: \"humio\",
       id: \"abc123\"
       queryString: \"@host=localhost\",
       eventForwarderId: \"def456\",
       languageVersion: legacy
    } 
  )
  { id }
}"
}
EOF
Windows Cmd and curl
shell
curl -v -X POST $YOUR_LOGSCALE_URL/graphql ^
    -H "Authorization: Bearer $TOKEN" ^
    -H "Content-Type: application/json" ^
    -d @'{"query" : "mutation { ^
  updateEventForwardingRule( input: ^
     { repoName: \"humio\", ^
       id: \"abc123\" ^
       queryString: \"@host=localhost\", ^
       eventForwarderId: \"def456\", ^
       languageVersion: legacy ^
    }  ^
  ) ^
  { id } ^
}" ^
} '
Windows Powershell and curl
powershell
curl.exe -X POST 
    -H "Authorization: Bearer $TOKEN"
    -H "Content-Type: application/json"
    -d '{"query" : "mutation {
  updateEventForwardingRule( input:
     { repoName: \"humio\",
       id: \"abc123\"
       queryString: \"@host=localhost\",
       eventForwarderId: \"def456\",
       languageVersion: legacy
    } 
  )
  { id }
}"
}'
    "$YOUR_LOGSCALE_URL/graphql"
Perl
perl
#!/usr/bin/perl

use HTTP::Request;
use LWP;

my $TOKEN = "TOKEN";

my $uri = '$YOUR_LOGSCALE_URL/graphql';

my $query = "mutation {
  updateEventForwardingRule( input:
     { repoName: \"humio\",
       id: \"abc123\"
       queryString: \"@host=localhost\",
       eventForwarderId: \"def456\",
       languageVersion: legacy
    } 
  )
  { id }
}";
$query =~ s/\n/ /g;
my $json = sprintf('{"query" : "%s"}',$query);
my $req = HTTP::Request->new("POST", $uri );

$req->header("Authorization" => "Bearer $TOKEN");
$req->header("Content-Type" => "application/json");

$req->content( $json );

my $lwp = LWP::UserAgent->new;

my $result = $lwp->request( $req );

print $result->{"_content"},"\n";
Python
python
#! /usr/local/bin/python3

import requests

url = '$YOUR_LOGSCALE_URL/graphql'
mydata = r'''{"query" : "mutation {
  updateEventForwardingRule( input:
     { repoName: \"humio\",
       id: \"abc123\"
       queryString: \"@host=localhost\",
       eventForwarderId: \"def456\",
       languageVersion: legacy
    } 
  )
  { id }
}"
}'''

resp = requests.post(url,
                     data = mydata,
                     headers = {
   "Authorization" : "Bearer $TOKEN",
   "Content-Type" : "application/json"
}
)

print(resp.text)
Node.js
javascript
const https = require('https');

const data = JSON.stringify(
    {"query" : "mutation {
  updateEventForwardingRule( input:
     { repoName: \"humio\",
       id: \"abc123\"
       queryString: \"@host=localhost\",
       eventForwarderId: \"def456\",
       languageVersion: legacy
    } 
  )
  { id }
}"
}
);


const options = {
  hostname: '$YOUR_LOGSCALE_URL',
  path: 'graphql',
  port: 443,
  method: 'POST',
  headers: {
    'Content-Type': 'application/json',
    'Content-Length': data.length,
    Authorization: 'BEARER ' + process.env.TOKEN,
    'User-Agent': 'Node',
  },
};

const req = https.request(options, (res) => {
  let data = '';
  console.log(`statusCode: ${res.statusCode}`);

  res.on('data', (d) => {
    data += d;
  });
  res.on('end', () => {
    console.log(JSON.parse(data).data);
  });
});

req.on('error', (error) => {
  console.error(error);
});

req.write(data);
req.end();
Example Responses
Success (HTTP Response Code 200 OK)
json
{
  "data": {
    "updateEventForwardingRule": {
      "id": "abc123"
    }
  }
}

Given Datatype

For the input datatype, you'll have to give the name of the repository and the unique identifier of the event forwarding rule, the query string for filtering and mapping events, and whatever else you want to update. Click on the Show Query link above the Syntax section for an example of how to find the identifier.

Table: UpdateEventForwardingRule

Security Requirements and Controls
ParameterTypeRequiredDefaultStabilityDescription
Some arguments may be required, as indicated in the Required column. For return datatypes, this indicates that you must specify which fields you want returned in the results.
Table last updated: Mar 28, 2025
eventForwarderIdstringyes Long-TermThe unique identifier of the event forwarder.
idstringyes Long-TermThe unique identifier for the event forwarding rule.
languageVersionLanguageVersionEnum legacyLong-TermThe version of Human language to use. If non-null, it will be a version known by the current LogScale installation. See LanguageVersionEnum.
queryStringstringyes Long-TermThe query string for filtering and mapping the events to forward.
repoNamestringyes Long-TermThe name of the repository associated with the event forwarding rule.

Returned Datatype

The returned datatype can provide the unique identifier for the event forwarding rule, the query string for filtering and mapping events to forward, and other details Below is a list of parameters you can request, along with descriptions:

Table: EventForwardingRule

ParameterTypeRequiredDefaultStabilityDescription
Some arguments may be required, as indicated in the Required column. For return datatypes, this indicates that you must specify which fields you want returned in the results.
Table last updated: Mar 26, 2025
createdAtlong  Long-TermThe UNIX timestamp of when the event forwarder was created.
eventForwarderIdstringyes Long-TermThe unique identifier of the event forwarder.
idstringyes Long-TermThe unique identifier for the event forwarding rule.
languageVersionLanguageVersionyes Long-TermThe version of the LogScale query language to use. See LanguageVersion.
queryStringstringyes Long-TermThe query string for filtering and mapping the events to forward.