Splunk® Supported Add-ons

Splunk Add-on for Kubernetes (Open-sourced)

Hardware and software requirements for the Splunk Add-on for Kubernetes

Prerequisites

The Splunk Add-on for Kubernetes uses data provided through Splunk Connect for Kubernetes. The Splunk Add-on for Kubernetes provides you with a Splunk Web interface and some saved searches, dashboards, and dashboard monitoring that help you manage the data from your Kubernetes configuration.

When you configure Splunk Connect for Kubernetes, you meet all of the requirements to set up the Add-on. For more information about Splunk Connect for Kubernetes see https://github.com/splunk/splunk-connect-for-kubernetes.

Splunk platform requirements

Because this add-on runs on the Splunk platform, all of the system requirements apply for the Splunk software that you use to run this add-on.

  • For Splunk Enterprise system requirements: see "System Requirements" in the Splunk Enterprise Installation Manual.
  • If you are managing on-premises forwarders to get data into Splunk Cloud, see "System Requirements" in the Splunk Enterprise Installation Manual, which includes information about forwarders.
Last modified on 12 October, 2021
Release notes for the Splunk Add-on for Kubernetes   Install the Splunk Add-on for Kubernetes

This documentation applies to the following versions of Splunk® Supported Add-ons: released


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters