The Docker Add-on seamlessly integrates with your self-hosted Docker environment, leveraging API calls to retrieve a variety of data, including container events, member information, groups, network configurations, and system policies.
Get activation key for new feature- https://avotrix.com/splunkapp.php
Installation & Configuration
Splunk Enterprise system requirements
This Add-on runs on Splunk Enterprise, all of the Splunk Enterprise system requirements apply.
Deployment Guide
• Single Instance (8.X)
(Pre-requisite) Docker Addon for Splunk
• Distributed deployment (8.x)
Heavy Forwarder – Docker Addon for Splunk
Search Head – Docker Addon for Splunk
Configuration for Inputs
1. Deploy Apps and Addons as per Deployment Guide above.
2. Navigate to configuration>> addon setting>>add activation key
3. Navigate to configuration>>Proxy >>add proxy settings (if applicable)
Note: Proxy server must have SSL enabled
4. Navigate to configuration>>Account>>Add>> put Docker IP and Docker DNS.
5. Navigate to the Inputs > Create New Inputs > Add Inputs.
6. Create the inputs to fetch the logs from Docker API.
7. Provide Global account(as per Account added)
8. Create/Select the Index for log ingestion.
9. Once inputs are created and data is flowing. Data feed health check Dashboard will reflect.
1.Bug fixes
2.Improved UI
3.Introduced logging to refine activation tracking and client service.
Version 1.0.0
1. Data feed health check
2. Proxy setup
3. Improved User Experience
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.