Integration provides Kubernetes monitoring solution that includes log aggregation, performance and system metrics, metrics from the control plane and application metrics, a dashboard for reviewing network activity, and alerts to notify you about cluster or application performance issues.
This integration forwards logs and metrics to Splunk. Pre-requisites for Splunk are
- Install Kubernetes Monitoring application
- Enable HTTP Event Collector (HEC) in Splunk
- Make sure to configure the forwarder settings below while setting up the pack
[general]acceptEULA = falselicense =fields.kubernetes_cluster = -...# Splunk output[output.splunk]# Splunk HTTP Event Collector urlurl =# Splunk HTTP Event Collector Tokentoken =# Allow invalid SSL server certificateinsecure = false# Path to CA certificatecaPath =# CA Name to verifycaName =
The following workloads gets deployed on collectorforkubernetes namespace, by default
- Collectorforkubernetes - Daemonset
- Collectorforkubernetes Master - Daemonset
- Collectorforkubernetes Addon - Deployment