What Information Contributes to Log-based Anomaly Detection? Insights from a Configurable Transformer-Based Approach