Note: A new option for sending data from Kubernetes to Splunk is now available with increased flexibility and performance. See Splunk OpenTelemetry Collector for Kubernetes for more information.
Splunk Connect for Kubernetes provides a way to import and search your Kubernetes logging, object, and metrics data in Splunk. Now, Splunk Connect for Kubenetes also supports importing and searching your container logs on AWS ECS and AWS Fargate using firelens. Splunk is a proud contributor to Cloud Native Computing Foundation (CNCF) and Splunk Connect for Kubernetes utilizes and supports multiple CNCF components in the development of these tools to get data into Splunk.
For installation and configuration instructions, see the Splunk Connect for Kubernetes documentation on github.
Splunk Connect For Kubernetes is supported through Splunk Support assuming the customer has a current Splunk support entitlement. For customers that do not have a current Splunk support entitlement, please file an issue at create a new issue at Create a new issue in splunk connect for kubernetes project The current maintainers of this project are the DataEdge team at Splunk. You can reach us at DataEdge@splunk.com.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.