Network routing and ingress for Splunk POD
Splunk POD provides access to cluster components using IP-based routing by default.
Access Splunk POD cluster components using the default IP-based routing or by manually configuring name-based routing. You can also set up the HTTP Event Collector (HEC) to ingest data over HTTP and establish secure S2S connections for universal forwarders.
IP based routing
By default, the cluster provides ingress using the IP address of any worker node.
Each node runs a load balancer that routes traffic to the appropriate service within the cluster. Any worker node IP address provides equivalent access to cluster services.
Port and URL Mapping
In this configuration, the Splunk Service API shares the same port as the Web UI.
| Component | Port | TLS | URL Example |
|---|---|---|---|
| SHC 1 UI | 443 | Yes | https://<WORKER_IP> |
| SHC 1 API | 443 | Yes | https://<WORKER_IP>/services |
| SHC 2 UI | 8100 | Yes | https://<WORKER_IP>:8100 |
| SHC2 API | 8100 | Yes | https://<WORKER_IP>:8100/services |
| Standalone SH 1 UI | 8000 | Yes | https://<WORKER_IP>:8000 |
| Standalone SH 1 API | 8000 | Yes | https://<WORKER_IP>:8000/services |
| Standalone SH 2 UI | 8001 | Yes | https://<WORKER_IP>:8001 |
| Standalone SH 2 API | 8001 | Yes | https://<WORKER_IP>:8001/services |
| HEC (HTTP Event Collector) | 443 | Yes | https://<WORKER_IP>/services/collector |
| Cluster Manager | 1443 | Yes | https://<WORKER_IP>:1443 |
| License Manager | 2443 | Yes | https://<WORKER_IP>:2443 |
| Monitoring Console | 3443 | Yes | https://<WORKER_IP>:3443 |
| S2S Forwarding | 9997 | No | tcp://<WORKER_IP>:9997 |
| Perses | 3000 | Yes | https://<WORKER_IP>:3000 |
To retrieve a list of current worker node IPs, run the following installer command:
./kubernetes-installer-standalone -static.cluster cluster-config.yaml -status.workers
Configure name based routing
Configure name-based routing that uses DNS records to route traffic to services.
The Splunk Kubernetes Installer does not configure name-based routing. Manually configure name-based routing for the cluster. When configured, all web traffic (UI and API) typically uses port 443, while S2S traffic remains on port 9997.
- DNS Records: Create CNAME records for each service (such as search.pod.example.com) pointing to a worker node IP.
- TLS Certificate: Obtain a wildcard certificate (such as *.pod.example.com) and the corresponding private key.
Configure HTTP Event Collector (HEC)
HEC is the primary method for data ingestion into Splunk Enterprise over HTTPS, targeting the indexer tier on port 443.
Configure S2S connections
The Splunk-to-Splunk (S2S) protocol provides secure data ingestion from Splunk Universal Forwarders (UF).
The Splunk-to-Splunk (S2S) protocol provides secure data ingestion from Splunk Universal Forwarders (UF).
S2S is available for TLS traffic over TCP port 9997, targeting the indexer tier. The Kubernetes installer does not manage or interact with forwarders. Configure forwarders manually or use agent management on the bastion node.
To establish a secure S2S connection, install matching security apps on both the indexer tier (within the cluster) and on forwarders (outside the cluster):