docs | title | weight |
---|---|---|
DOCS-566 |
Splunk Integration |
40 |
(Optional) If you want to forward metrics and you haven't already created a Splunk Index for metrics, take the steps below to add one. You can do the same for events, although you could also use the existing, default "main" index.
- Open the Splunk web interface and log in.
- Select Settings, then select Indexes.
- Select New Index.
- Add a Name.
- For the Index Data Type, select Metrics or Events.
- Select Save.
- Open the Splunk web interface and log in.
- On the Explore Splunk Enterprise menu, select Add Data.
- Select Monitor as the data method.
- On the Add Data Select Source page, select HTTP Event Collector.
- Add a Name.
- Add a Description.
- Select Next.
- On the Add Data Input Settings page, select one or more of the available Splunk Indexes with the appropriate Index Data Type.
- Select Review.
- On the summary page, copy and save the token value. You'll configure F5 NGINX Controller with this value later.
Take the following steps to create an Integration for Splunk:
- Open the NGINX Controller user interface and log in.
- Select the NGINX Controller menu icon, then select Platform.
- On the Platform menu, select Integrations.
- On the Integrations menu, select the Create Integration quick action.
- Add a name.
- (Optional) Add a display name.
- (Optional) Add a description.
- (Optional) Add tags.
- In the Integration Type list, select
GENERIC_INTEGRATION
. - In the Endpoint URI box, add the Splunk collector URL.
- In the Credential Type list, select
API_KEY
. - In the API Key box, add the [Splunk token value]({{< ref "/controller/analytics/forwarders/forward-analytics-to-splunk.md#set-up-splunk-to-monitor-data" >}}).
- Select Submit.