# Event tab

![Event tab, Splunk Output](https://3411831820-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FAYwCj9fPr1B2pjC11IOQ%2Fuploads%2Fgit-blob-0c2269aa049142b87fa3cdb370ed13c98c3dd189%2FPDI_TransStep_Tab_Splunk_Output_Event.png?alt=media)

In this tab, you can define the following event properties and options, as described in the table below.

| Option                  | Description                                                                                                                                                                                                                                                                                                                                                             |
| ----------------------- | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| **Index to write to**   | Specifies the Splunk index where the events are stored. Usually, this is the main index. Check your Splunk server for a list of available indices. This field can be a parameter with incoming fields (**?{\<Field>}**) or transformation parameters **(${Parameter}**).                                                                                                |
| **Host**                | Indicates the hostname of the original event host. If you want to gather data from a router and write it to Splunk, use the router's host name. This field can be a parameter with incoming fields (**?{\<Field>}**) or transformation parameters (**${Parameter}**).                                                                                                   |
| **Source type**         | Indicates the format type of the event data. The list of known source types appears [here](http://docs.splunk.com/Documentation/Splunk/5.0.2/Data/Listofpretrainedsourcetypes). To define a new format, follow [these instructions](http://docs.splunk.com/Documentation/Splunk/5.0.2/Knowledge/Createandmaintainsearch-timefieldextractionsthroughconfigurationfiles). |
| **Source**              | Indicates the source of the event data. See [Splunk documentation](http://docs.splunk.com/Splexicon:Sourcetype) for more details.                                                                                                                                                                                                                                       |
| **Custom Splunk event** | If checked, enables the Splunk Event Data option and allows you to customize the data coming into Splunk. This is useful if you want to write a different format than the default, which is name value pairs separated by newline characters.                                                                                                                           |
| **Splunk Event Data**   | Allows you to specify customized event text. This field can be a parameter with incoming fields (**?{\<Field>}**) or transformation parameters (**${Parameter}**).                                                                                                                                                                                                      |
