About the Splunk Add-on for NGINX
|Vendor Products||NGINX Plus R16 v1.15.2, R17 v1.15.7, R18 v1.15.10, R19 v1.17.3, R20 v1.17.6, R21 v1.17.9, R22 v1.19.0 |
NGINX App Protect v1.3.0, v2.0
|Visible in Splunk Web||No. This add-on does not contain any views.|
If you are upgrading the Splunk Add-on for NGINX from a previous version to 3.0.0, you must follow the same instructions as a new install and complete all of the configuration steps from the beginning. You should only upgrade if you are also upgrading (or have already upgraded) your NGINX installation to one of the compatible NGINX versions for 3.0.0. If you upgrade either your NGINX product or Splunk Add-on installation without upgrading the other and completing the configuration steps, your the add-on will not be able to ingest new data.
The Splunk Add-on for NGINX allows a Splunk software administrator to collect Web server activities, performance metrics, and error logs using file monitoring and API inputs. After the Splunk platform indexes the events, you can analyze the data using the add-on.
This add-on provides the inputs and CIM-compatible knowledge to use with other Splunk apps, such as Splunk Enterprise Security, the Splunk App for PCI Compliance, and Splunk IT Service Intelligence.
Download the Splunk Add-on for NGINX from Splunkbase at http://splunkbase.splunk.com/app/3258.
Discuss the Splunk Add-on for NGINX on Splunk Answers at http://answers.splunk.com/answers/app/3258.
Hardware and software requirements for the Splunk Add-on for NGINX
This documentation applies to the following versions of Splunk® Supported Add-ons: released