Splunk Integration
(Optional) If you want to forward metrics and you haven’t already created a Splunk Index for metrics, take the steps below to add one. You can do the same for events, although you could also use the existing, default “main” index.
- Open the Splunk web interface and log in.
 - Select Settings, then select Indexes.
 - Select New Index.
 - Add a Name.
 - For the Index Data Type, select Metrics or Events.
 - Select Save.
 
- Open the Splunk web interface and log in.
 - On the Explore Splunk Enterprise menu, select Add Data.
 - Select Monitor as the data method.
 - On the Add Data Select Source page, select HTTP Event Collector.
 - Add a Name.
 - Add a Description.
 - Select Next.
 - On the Add Data Input Settings page, select one or more of the available Splunk Indexes with the appropriate Index Data Type.
 - Select Review.
 - On the summary page, copy and save the token value. You’ll configure F5 NGINX Controller with this value later.
 
Take the following steps to create an Integration for Splunk:
- Open the NGINX Controller user interface and log in.
 - Select the NGINX Controller menu icon, then select Platform.
 - On the Platform menu, select Integrations.
 - On the Integrations menu, select the Create Integration quick action.
 - Add a name.
 - (Optional) Add a display name.
 - (Optional) Add a description.
 - (Optional) Add tags.
 - In the Integration Type list, select 
GENERIC_INTEGRATION. - In the Endpoint URI box, add the Splunk collector URL.
 - In the Credential Type list, select 
API_KEY. - In the API Key box, add the Splunk token value.
 - Select Submit.