Get the Splunk Add-On for Redis Enterprise by downloading it from Splunkbase or browsing to it using the app browser within Splunk Web.
Determine where and how to install this add-on in your deployment, using the tables on this page.
Perform any prerequisite steps before installing, if required and specified in the tables below.
Complete your installation.
If you need step-by-step instructions on how to install an add-on in your specific deployment environment, see the installation walkthroughs section at the bottom of this page for links to installation instructions specific to a single-instance deployment, distributed deployment, Splunk Cloud, or Splunk Light.
Use the tables below to determine where and how to install this add-on in a distributed deployment of Splunk Enterprise or any deployment for which you are using forwarders to get your data in. Depending on your environment, your preferences, and the requirements of the add-on, you may need to install the add-on in multiple places.
Unless otherwise noted, all supported add-ons can be safely installed to all tiers of a distributed Splunk platform deployment. See Where to install Splunk add-ons in Splunk Add-ons for more information.
This table provides a reference for installing this specific add-on to a distributed deployment of Splunk Enterprise.
|Splunk instance type||Supported||Required||Actions required / Comments|
|Search Heads||Yes||Yes||Install this add-on to all search heads where Box knowledge management is required.|
|Indexers||Yes||No||Not required, because the parsing operations occur on the heavy forwarders.|
|Heavy Forwarders||Yes||Yes||Install this add-on on heavy forwarders to perform data collection via modular inputs.|
|Universal Forwarders||No||No||Install this add-on on a heavy forwarder for data collection.|
This add-on can be installed on a search head cluster for all search-time functionality, but configure inputs on forwarders to avoid duplicate data collection.
The Splunk Add-Ons manual includes an Installing add-ons guide that helps you successfully install any add-on to your Splunk platform.
Configurationin the app menu
Addand enter username and password for the Redis Enterprise cluster administrator (REST API access)
Inputsin the app menu
Create New Inputand choose one of the available input types
Added inputs for alerts and cluster, node, bdb info
Added `index` dropdown in all dashboards
Introduced http/https parameter in input configuration
Added dashboards for Cluster Stats, Node Stats, and Event Logs
Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 50GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.