End of Sale Notice:
F5 NGINX is announcing the End of Sale (EoS) for NGINX Controller API Management Module, effective January 1, 2024.
F5 maintains generous lifecycle policies that allow customers to continue support and receive product updates. Existing NGINX Controller API- Management customers can continue to use the product past the EoS date. License renewals are not available after September 30, 2024.
See our End of Sale announcement for more details.
End of Sale Notice:
F5 NGINX is announcing the End of Sale (EoS) for NGINX Controller Application Delivery Module, effective January 1, 2024.
F5 maintains generous lifecycle policies that allow customers to continue support and receive product updates. Existing NGINX Controller Application Delivery customers can continue to use the product past the EoS date. License renewals are not available after September 30, 2024.
See our End of Sale announcement for more details.
Splunk Integration
Splunk Integration Requirements
(Optional) If you want to forward metrics and you haven’t already created a Splunk Index for metrics, take the steps below to add one. You can do the same for events, although you could also use the existing, default “main” index.
- Open the Splunk web interface and log in.
- Select Settings, then select Indexes.
- Select New Index.
- Add a Name.
- For the Index Data Type, select Metrics or Events.
- Select Save.
Set up Splunk to Monitor Data
- Open the Splunk web interface and log in.
- On the Explore Splunk Enterprise menu, select Add Data.
- Select Monitor as the data method.
- On the Add Data Select Source page, select HTTP Event Collector.
- Add a Name.
- Add a Description.
- Select Next.
- On the Add Data Input Settings page, select one or more of the available Splunk Indexes with the appropriate Index Data Type.
- Select Review.
- On the summary page, copy and save the token value. You’ll configure F5 NGINX Controller with this value later.
Add a Splunk Integration
Take the following steps to create an Integration for Splunk:
- Open the NGINX Controller user interface and log in.
- Select the NGINX Controller menu icon, then select Platform.
- On the Platform menu, select Integrations.
- On the Integrations menu, select the Create Integration quick action.
- Add a name.
- (Optional) Add a display name.
- (Optional) Add a description.
- (Optional) Add tags.
- In the Integration Type list, select
GENERIC_INTEGRATION
. - In the Endpoint URI box, add the Splunk collector URL.
- In the Credential Type list, select
API_KEY
. - In the API Key box, add the Splunk token value.
- Select Submit.