The Splunk Add-on for New Relic allows a Splunk software administrator to collect data from New Relic APM and New Relic Insights platforms using modular inputs. Data collected from New Relic includes general information about servers, applications, mobile applications, key transactions, policy violations, and New Relic Insights query results. You can then directly analyze the data or use it as a contextual data feed to correlate with other application performance-related data in the Splunk platform.
The Splunk Add-on for New Relic includes field extractions and mappings for the Splunk ITSI Module for Application Performance Monitoring.
New Relic APM (application performance monitoring) is New Relic's software analytics product that delivers real-time and trending data about your web application's performance and the level of satisfaction that your end users experience. New Relic Insights is a software analytics resource that gathers and visualizes data from your software to provide information about your business.
You can download the Splunk Add-on for New Relic from Splunkbase.
Installation consists of 3 steps:
1. Install the Add-On
2. Setup Proxy and Logging Configuration
3. Create a New Relic Account Input
After installing the add-on complete the following steps for setup and configuration of the Add-On and then add Inputs to ingest New Relic data.
If you are using a proxy or want to change the default logging level (INFO), follow the steps in this section to set up the add-on; otherwise, skip this section. You can configure the add-on either through the Splunk Web or by making changes directly in the configuration files.
If you are using a proxy, configure proxy settings under the Proxy tab.
Configure the data collection logging level under the Logging tab.
The data collection logging level defaults to INFO. Optionally, set the logging level under the Logging tab. You get increasingly more verbose logging in the following order: ERROR, WARN, INFO, DEBUG.
Configure data inputs to collect data from New Relic APM and New Relic Insights platforms. Data inputs reside on a data collection node, usually a heavy forwarder. You can configure these inputs either by using Splunk Web or by editing
These inputs collect APM information from the New Relic APIs. See the sourcetypes below for details about what data can be collected.
|Name||A unique name that identifies the input.|
|Interval||Time interval to collect data, in seconds. Use an interval of less than 300 seconds if you are using this data with the Splunk ITSI Module for Application Performance Monitoring. The default is 60 seconds.|
|Index||The index in which to store the collected data.|
|API Key||An API key required to perform user accessible New Relic REST API operations. If you have not generated a REST API key in New Relic, search for "API keys" in the New Relic documentation.|
|API URL||One or more API URL endpoints that specify which New Relic APM data to collect.|
|Account ID||The number that can be found in your New Relic URL. For example, https://rpm.newrelic.com/accounts/<New_Relic_account_number>/applications.|
inputs.conffile in your add-on directory:
$SPLUNK_HOME/etc/apps/Splunk_TA_New_Relic/localon Unix-based environments
%SPLUNK_HOME%\etc\apps\Splunk_TA_New_Relic\localon Windows environments
[new_relic_account_input://<unique_input_name>] account = <The number that can be found in your New Relic URL. > api_key = <Your API key, required to perform user accessible New Relic REST API operations. If you have not generated a REST API key in New Relic, search for "API keys" in the New Relic documentation.> api_url = <API URL endpoints that specify which New Relic APM data to collect, separated by ~. See the example for formatting and possible values.> interval = <Time interval in seconds to collect data. Use an interval of less than 300 seconds if you are using this data with the Splunk ITSI Module for Application Performance Monitoring. The default is 60 seconds.> index = <The index in which to store the collected data.> Example: [new_relic_account_input://example_input] account = 1234567 api_key = ******** api_url = applications.json~key_transactions.json~mobile_applications.json~browser_applications.json~servers.json~alerts_events.json~alerts_violations.json interval = 60 index =newrelic
The Splunk Add-on for New Relic provides the following source types for data collected from New Relic APM and New Relic Insights.
|Input / Source type||Description||ITSI data model|
|New Relic API Inputs|
||General information about Alert events, including ID, event type, description, timestamp, entity data, and incident ID.||None|
||General information about violations.||None|
||General information about applications monitored by New Relic, including response time, apdex, throughput and settings.||Application Performance Management|
||General information about mobile applications monitored by New Relic, including active users, interaction time, crash rate, and http error rate.||None|
||General information about servers monitored by New Relic, including hostname, cpu, and memory stats.||None|
||General information about key transactions monitored by New Relic, including response time, apdex, and throughput.||None|
|New Relic Insights|
||Event data directly collected from New Relic Insights through the Insights Query API.||None|
Updated to support Splunk 8.x and Python3.
Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.