Upgrade the Splunk Add-on for NGINX
There are different upgrade instructions for different versions of the Splunk Add-on for NGINX.
Upgrade to version 3.2.1 and above from 3.2.0
- If you are upgrading the Splunk Add-on for NGINX from version 3.2.0 to 3.2.1 and above, there are no additional steps required for this version upgrade.
Upgrade to version 3.2.0 from 3.1.0
- If you are upgrading the Splunk Add-on for NGINX from version 3.1.0 to 3.2.0, there are no additional steps required for this version upgrade.
Upgrade to version 3.1.0 from 3.0.0
- If you are upgrading the Splunk Add-on for NGINX from version 3.0.0 to 3.1.0, There are no additional steps required for this version upgrade.
Upgrade to version 3.0.0
- If you are upgrading the Splunk Add-on for NGINX from a previous version to 3.0.0, you must follow the same instructions as a new install and complete all of the configuration steps from the beginning.
- You should only upgrade if you are also upgrading (or have already upgraded) your NGINX installation to one of the compatible NGINX versions for 3.0.0.
- If you upgrade either your NGINX product or Splunk Add-on installation without upgrading the other and completing the configuration steps, the add-on will not be able to ingest new data.
Upgrade to version 2.0.2
If you are using these versions of NGINX, use version 2.0.2 of the Splunk Add-on for NGINX:
- NGINX Plus R8 versions 1.9.9
- NGINX Plus R15 versions 1.13.10 (New NGINX Plus API not supported)
There are 2 ways to upgrade the Splunk Add-on for NGINX for 2.0.2:
- Authentication
- Default settings
Upgrade using the authentication feature
Versions 2.0.x and later of the Splunk Add-on for NGINX include a feature to use authentication to access status endpoints, if they are configured on an NGINX Server. To use this feature, use the following upgrade steps.
- Log in to Splunk Web.
- Select Settings > Data inputs > Splunk Add-on for NGINX.
- Disable all Splunk Add-on for NGINX inputs.
- Download and install the latest version of the Splunk Add-on for NGINX from Splunkbase.
- Identify whether your NGINX deployment uses encrypted or unencrypted communication. See the Switch between encrypted and unencrypted communication section of this manual for more information.
- Configure authentication on NGINX Server. See the topic on Restricting Access with HTTP Basic Authentication in the NGINX documentation.
- Click on the input name and edit the Nginx URL field value to remove the
http_scheme
. For example, changehttp://127.0.0.1/status
to127.0.0.1/status
- (Optional) Add the NGINX username you use to access the NGINX status JSON REST interface
- (Optional) Add the NGINX password you use to access the NGINX status JSON REST interface
- Save your changes.
- Restart your Splunk platform instance.
- Enable each Splunk Add-on for NGINX input.
Upgrade using default settings
By default, all communications from version 2.0.x of the Splunk Add-on for NGINX to your NGINX servers are encrypted via HTTPS with SSL certificate validation enabled. If you are using the nginx:plus:api
input, use the following steps to upgrade from version 1.0.0 to version 2.0.x.
- Log in to Splunk Web.
- Select Settings > Data inputs > Splunk Add-on for NGINX.
- Disable all Splunk Add-on for NGINX inputs.
- Download and install the latest version of the Splunk Add-on for NGINX from Splunkbase.
- Identify whether your NGINX deployment uses encrypted or unencrypted communication. See the Switch between encrypted and unencrypted communication section of this manual for more information.
- Restart your Splunk platform instance.
- Log in to Splunk Web.
- Select Settings > Data inputs > Splunk Add-on for NGINX.
- Click on each input name and edit the
Nginx URL
field value to remove thehttp_scheme
(For example, changehttp://127.0.0.1/status
to127.0.0.1/status
) - Save your changes.
- Restart your Splunk platform instance.
- Enable each input.
Install the Splunk Add-on for NGINX | Configure NGINX logging and monitoring |
This documentation applies to the following versions of Splunk® Supported Add-ons: released
Feedback submitted, thanks!