Table of Contents
Overview ↵
About the Splunk Add-on for Apache Web Server¶
| Component | Description |
|---|---|
| Version | 2.1.0 |
| Vendor Products | Apache 2.4.x |
The Splunk Add-on for Apache Web Server allows a Splunk software administrator to collect and analyze data from Apache Web Server using file monitoring.
Release notes¶
For a summary of new features, fixed issues, and known issues, and for more information on release history, see Release notes for the Splunk Add-on for Apache Web Server.
Compatibility¶
This add-on provides the inputs and Common Information Model (CIM)-compatible knowledge to use with other Splunk apps, such as Web.
Source types and lookups¶
For more information about the source types and lookups for Splunk Add-on for Apache Web Server, see Source types and Lookups
Download the add-on¶
Download the Splunk Add-on for Apache Web Server from Splunkbase.
Install and configure the add-on¶
To install and configure the Splunk Add-on for Apache Web Server, see Installation and configuration overview for the Splunk Add-on for Apache Web Server.
Hardware and software requirements¶
For more information, see Hardware and software requirements.
Additional resources¶
Discuss the Splunk Add-on for Apache Web Server on the Splunk Community page.
Release notes for Splunk Add-on for Apache Web Server¶
Version 3.0.0¶
Version 3.0.0 of the Splunk Add-on for Apache was released on April 9th, 2026.
Compatibility¶
This release is compatible with the following software, CIM versions, and platforms:
| Component | Description |
|---|---|
| Splunk platform versions | 9.1.x, 9.2.x, 9.3.x, 9.4.x, 10.0.x, 10.1.x, 10.2.x |
| CIM | 6.x.x |
| Platforms | Platform Independent |
| Vendor Products | Apache 2.4.x and later |
Note
The field alias functionality is compatible with the current version of this add-on. The current version of this add-on does not support older field alias configurations.
For more information about the field alias configuration change, refer to the Splunk Enterprise Release Notes.
New features¶
Version 3.0.0 of the Splunk Add-on for Apache Web Server contains the following new features:
-
Removed support for python 3.7
-
Python 3.9 support added
Fixed issues¶
Version 3.0.0 of the Splunk Add-on for Apache Web Server contains no fixed issues.
Known issues¶
Version 3.0.0 of the Splunk Add-on for Apache Web Server contains no known issues.
Third-party software attributions¶
Version 3.0.0 of the Splunk Add-on for Apache Web Server does not incorporate any third-party software or libraries.
Release history for the Splunk Add-on for Apache Web Server¶
Version 2.2.1¶
Version 2.2.1 of the Splunk Add-on for Apache was released on February 5, 2026.
Compatibility¶
This release is compatible with the following software, CIM versions, and platforms:
| Component | Description |
|---|---|
| Splunk platform versions | 9.1.x, 9.2.x, 9.3.x, 9.4.x, 10.0.x, 10.1.x, 10.2.x |
| CIM | 6.x.x |
| Platforms | Platform Independent |
| Vendor Products | Apache 2.4.x and later |
Note
The field alias functionality is compatible with the current version of this add-on. The current version of this add-on does not support older field alias configurations.
For more information about the field alias configuration change, refer to the Splunk Enterprise Release Notes.
New features¶
Version 2.2.1 of the Splunk Add-on for Apache Web Server contains the following new features:
- Support for CIM v6.2.0
Fixed issues¶
Version 2.2.1 of the Splunk Add-on for Apache Web Server contains no fixed issues.
Known issues¶
Version 2.2.1 of the Splunk Add-on for Apache Web Server contains no known issues.
Third-party software attributions¶
Version 2.2.1 of the Splunk Add-on for Apache Web Server does not incorporate any third-party software or libraries.
The latest version of the Splunk Add-on for Apache Web Server is version 2.2.0. See Release notes for the Splunk Add-on for Apache Web Server for release notes of this latest version.
Version 2.1.0¶
Version 2.1.0 of the Splunk Add-on for Apache was released on June 3, 2022.
Compatibility¶
This release is compatible with the following software, CIM versions, and platforms:
| Component | Description |
|---|---|
| Splunk platform versions | 8.1.x, 8.2.x |
| CIM | 5.0.1 |
| Platforms | Platform Independent |
| Vendor Products | Apache 2.4.x and later |
Note
The field alias functionality is compatible with the current version of this add-on. The current version of this add-on does not support older field alias configurations.
For more information about the field alias configuration change, see Splunk Enterprise Release Notes.
New features¶
Version 2.1.0 of the Splunk Add-on for Apache Web Server contains the following new features.
- Added support for Apache version 2.4.53.
- Added support for the
apache:access:combinedsourcetype, which provides server access log information in an out-of-the-box default format.
Note
Splunk best practice is to use the enhanced log format instead and use the apache:access:kv or apache:access:json sourcetypes
- Enhanced CIM mappings and added support for CIM version 5.0.1.
- Added extraction for new CIM fields url_length, http_referrer_domain and url_domain in the
apache:access:kvandapache:access:jsonsourcetypes.
Field Mapping Changes¶
Version 2.1.0 of the Splunk Add-on for Apache Web Server introduces field changes to the apache:access:kv and apache:access:json sourcetypes. See the following table for information in data model changes:
| Source-type | Fields added | Fields removed | Fields modified |
|---|---|---|---|
apache:access:combined |
status_description, uri_query, http_user_agent, http_version, http_referrer, bytes, client, request, src, url, http_method, status_type, http_user_agent_length, http_referrer_domain, action, bytes_out, uri_path, logname, status, bytes_in, request_bytes, user, vendor_product, timestamp | ||
apache:access:kv, apache:access:json |
url_length, http_referrer_domain, url_domain |
Fixed issues¶
Version 2.1.0 of the Splunk Add-on for Apache Web Server contains no fixed issues.
Known issues¶
Version 2.1.0 of the Splunk Add-on for Apache Web Server contains no known issues.
Third-party software attributions¶
Version 2.1.0 of the Splunk Add-on for Apache Web Server does not incorporate any third-party software or libraries.
Version 2.0.0¶
Version 2.0.0 of the Splunk Add-on for Apache was released on September 23, 2020.
Compatibility¶
This release is compatible with the following software, CIM versions, and platforms:
| Component | Description |
|---|---|
| Splunk platform versions | 7.2.x, 7.3.x, 8.0.x |
| CIM | 4.17 |
| Platforms | Platform Independent |
| Vendor Products | Apache 2.4.x and later |
Note
The field alias functionality is compatible with the current version of this add-on. The current version of this add-on does not support older field alias configurations.
For more information about the field alias configuration change, refer to the Splunk Enterprise Release Notes.
New features¶
Version 2.0.0 of the Splunk Add-on for Apache Web Server contains the following new features.
- Support for Apache version 2.4.46.
- Support for the following sourcetypes:
- The
apache:access:kv, which provides server access log information in KV format. - The
apache:access:json, which provides server access log information in JSON format. - Increased Web CIM data model compatibility
Fixed issues¶
Version 2.0.0 of the Splunk Add-on for Apache Web Server contains no fixed issues.
Known issues¶
Version 2.0.0 of the Splunk Add-on for Apache Web Server contains no known issues.
Third-party software attributions¶
Version 2.0.0 of the Splunk Add-on for Apache Web Server does not incorporate any third-party software or libraries.
Version 1.0.0¶
Version 1.0.0 of the Splunk Add-on for Apache was released on June 7, 2016.
Compatibility¶
This release is compatible with the following software, CIM versions, and platforms:
| Component | Description |
|---|---|
| Splunk platform versions | 6.6.x, 7.0.x, 7.1.x, 7.2.x, 7.3.x, 8.0.x |
| CIM | 4.11 |
| Platforms | Platform Independent |
| Vendor Products | Apache httpd 2.2.x, Apache 2.4.x and later |
New features¶
Version 1.0.0 of the Splunk Add-on for Apache Web Server provides inputs and CIM normalization for Apache Web Server data.
Known issues¶
Version 1.0.0 of the Splunk Add-on for Apache Web Server contains no known issues.
Third-party software attributions¶
Version 1.0.0 of the Splunk Add-on for Apache Web Server does not incorporate any third-party software or libraries.
Hardware and software requirements for the Splunk Add-on for Apache Web Server¶
Apache Web Server setup requirements¶
You must have access to the Apache Web Server installation directory so that you can configure Apache Web Server to format log data for the Splunk platform to ingest through file monitoring.
Splunk platform requirements¶
Because this add-on runs on the Splunk platform, all of the system requirements apply for the Splunk software that you use to run this add-on.
- For Splunk Enterprise system requirements: see System Requirements in the Splunk Enterprise Installation Manual.
- If you are managing on-premises forwarders to get data into Splunk Cloud, see System Requirements in the Splunk Enterprise Installation Manual, which includes information about forwarders.
Note
The field alias functionality is compatible with the current version of this add-on. The current version of this add-on does not support older field alias configurations.
For more information about the field alias configuration change, refer to the Splunk Enterprise Release Notes.
Installation overview for the Splunk Add-on for Apache Web Server¶
Complete the following steps to install and configure this add-on on your supported platform.
Ended: Overview
Installation ↵
Installation instructions¶
See Installing add-ons in Splunk Add-Ons for detailed instructions describing how to install a Splunk add-on in the following deployment scenarios:
Distributed deployments¶
Use the tables on this page to determine where and how to install this add-on in a distributed deployment of Splunk Enterprise.
Where to install this add-on¶
This table provides a quick reference for installing this add-on to a distributed deployment of Splunk Enterprise.
| Splunk instance type | Supported | Required | Comments |
|---|---|---|---|
| Search Heads | Yes | Yes | Install this add-on to all search heads that require Apache Web Server management. |
| Indexers | Yes | Conditional | Not required if you use heavy forwarders to monitor Apache Web Server log. Required if you use universal or light forwarders to monitor Apache Web Server log output. |
| Heavy Forwarders | Yes | No | Use any kind of forwarder. |
| Universal Forwarders | Yes | No | Use any kind of forwarder. |
| Light Forwarders | Yes | No | Use any kind of forwarder. |
Distributed deployment feature compatibility¶
This table provides a quick reference for the compatibility of this add-on with Splunk distributed deployment features.
| Distributed deployment feature | Supported | Comments |
|---|---|---|
| Search Head Clusters | Yes | You can install this add-on on a search head cluster for all search-time functionality. Before installing this add-on to a cluster, remove the eventgen.conf file and all files in the Samples folder. |
| Indexer Clusters | Yes | You can install this add-on on a indexer cluster for all index-time functionality. Before installing this add-on to a cluster, remove the eventgen.conf file and all files in the Samples folder. |
| Deployment Server | Yes | You can use deployment server to deploy the configured add-on to forwarders. Before distributing this add-on to your forwarders, remove the eventgen.conf file and all files in the Samples folder. |
Upgrade the Splunk Add-on for Apache Web Server¶
No special steps are required to upgrade the Splunk Add-on for Apache Web Server from version 2.0.0. to version 2.1.0. Follow the steps in the Install the Splunk Add-on for Apache Web Server topic in this manual.
Update the apache log formatting configuration to generate logs in the new format by following the Configure log formatting on the Apache Web Server using httpd.conf topic in this manual.
Based on your configuration, perform changes in the Configure monitor inputs for the Splunk Add-on for Apache Web Server topic in this manual.
See Configure enhanced log formatting on the Apache Web Server using httpd.conf for more information.
- Splunk best practice is to use the enhanced Key-Value pair or JSON format. The sourcetypes for apache access logs when using the Key-value pair are
apache:access:kvThe sourcetype for apache access logs when using the Json format areapache:access:json - For the default out-of-the-box format, the sourcetype for apache access logs are
apache:access:combined
Ended: Installation
Configuration ↵
Configure enhanced log formatting on the Apache Web Server using httpd.conf¶
Configure log formatting on the Apache Web Server using httpd.conf. This lets the Splunk Add-on for Apache Web Server monitor your deployment’s log files.
To make sure you have all the required fields present in apache access_log, Splunk best practice is to use an enhanced custom log format in the apache httpd.conf file. For more information, see Configure monitor inputs for the Splunk Add-on for Apache Web Server.
The Splunk Add-on for Apache Web Server now supports the default out-of-the-box log format of Apache Web Server; the add-on extracts all possible CIM fields where present and makes them searchable. However, this log format is missing many critical CIM fields (for example, user, hostname, and so on), so note that the add-on does not apply CIM Data Model tags to those events. Splunk best practice is still to use an enhanced custom log format which requires modifications to httpd.conf, and use the apache:access:kv or apache:access:json sourcetypes. To use the default out-of-the-box events, ignore the following procedure and proceed with Configure monitor inputs for the Splunk Add-on for Apache Web Server.
- Open the
httpd.confin the Apache Web Server installation folder$APACHE_HOME/etc/apache/conf/httpd.conf
Note
The default location of httpd.conf might be different on different platforms.
- Look for the statement
<IfModule log_config_module>and replace the whole block with the following stanza:
<IfModule log_config_module>
#
# The following directives define some format nicknames for use with
# a CustomLog directive (see below).
#
LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\"" combined
LogFormat "%h %l %u %t \"%r\" %>s %b" common
<IfModule logio_module>
# You need to enable mod_logio.c to use %I and %O
LogFormat "time=%{%s}t.%{usec_frac}t, bytes_in=%I, bytes_out=%O, cookie=\"%{Cookie}i\", server=%v, dest_port=%p, http_content_type=\"%{Content-type}i\", http_method=\"%m\", http_referrer=\"%{Referer}i\", http_user_agent=\"%{User-agent}i\", ident=\"%l\", response_time_microseconds=%D, client=%h, status=%>s, uri_path=\"%U\", uri_query=\"%q\", user=\"%u\"" splunk_kv
#LogFormat "{\"time\":\"%{%s}t.%{usec_frac}t\", \"bytes_in\":\"%I\", \"bytes_out\":\"%O\", \"cookie\":\"%{Cookie}i\", \"server\":\"%v\", \"dest_port\":\"%p\", \"http_content_type\":\"%{Content-type}i\", \"http_method\":\"%m\", \"http_referrer\":\"%{Referer}i\", \"http_user_agent\":\"%{User-agent}i\", \"ident\":\"%l\", \"response_time_microseconds\":\"%D\", \"client\":\"%h\", \"status\":\"%>s\", \"uri_path\":\"%U\", \"uri_query\":\"%q\", \"user\":\"%u\"}" splunk_json
#LogFormat "%h %l %u %t \"%r\" %>s %b \"%{Referer}i\" \"%{User-Agent}i\" %I %O" combinedio
</IfModule>
#
# The location and format of the access logfile (Common Logfile Format).
# If you do not define any access logfiles within a <VirtualHost>
# container, they will be logged here. Contrariwise, if you *do*
# define per-<VirtualHost> access logfiles, transactions will be
# logged therein and *not* in this file.
#
# CustomLog "logs/access_log" common
#
# If you prefer a logfile with access, agent, and referer information
# (Combined Logfile Format) you can use the following directive.
#
CustomLog "logs/access_log" splunk_kv
#CustomLog "logs/access_log" splunk_json
#CustomLog "logs/access_log" combined
</IfModule>
-
Choose either the
splunk_kvorsplunk_jsonformat for access logs. You can enable only one format at a time. The information provided by eithersplunk_kvandsplunk_jsonis the same. The difference is only in formatting. By default,splunk_kvis enabled and thesplunk_jsonis disabled. To enable thesplunk_jsonformat:a. Comment out the
splunk_kvdefinition and log file directives.b. Uncomment the
splunk_jsondefinition and log file directives.
Note
The KV pair formatting is simpler when compared to JSON formatting. The best practice is to include new custom fields, if required, in KV format. If applied in JSON format, then it must comply with strict JSON formatting.
-
Validate the syntax of the conf file after you make your changes:
sudo apache2ctl configtestor
sudo httpd -tIf the output says
syntax ok, proceed. -
Restart Apache Web Server. If the log format in Apache Web Server is configured correctly, you receive log files that look like this:
- For
splunk_kv
time=###TIME###.000000, bytes_in=###BYTES_IN###, bytes_out=###BYTES_OUT###, cookie="###COOKIE###", server=C6852495051.domain, dest_port=###DEST_PORT###, http_content_type="###HTTP_CONTENT_TYPE###", http_method="###HTTP_METHOD###", http_referrer="###HTTP_REFERRER###", http_user_agent="###HTTP_USER_AGENT###", ident="1", response_time_microseconds=###RESPONSE_TIME_MICROSECONDS###, client=###CLIENT###, status=###STATUS###, uri_path="###URI_PATH###", uri_query="###URI_QUERY###", user="xyz123"
- For
splunk_json
{"time":"###TIME###.000000", "bytes_in":"###BYTES_IN###",
"bytes_out":"###BYTES_OUT###", "cookie":"###COOKIE###", "server":"C6852495051.domain", "dest_port":"###DEST_PORT###", "http_content_type":"###HTTP_CONTENT_TYPE###", "http_method":"###HTTP_METHOD###", "http_referrer":"###HTTP_REFERRER###", "http_user_agent":"###HTTP_USER_AGENT###", "ident":"1", "response_time_microseconds":"###RESPONSE_TIME_MICROSECONDS###", "client":"###CLIENT###", "status":"###STATUS###", "uri_path":"###URI_PATH###", "uri_query":"###URI_QUERY###", "user":"xyz123"}
Note
The new fields are auto extracted without making any change in the add-on’s field extraction.
Configure monitor inputs for the Splunk Add-on for Apache Web Server¶
The Splunk Add-on for Apache Web Server collects data through file monitoring. After installing the add-on, you need to configure the platform to monitor the access and error log file generated by Apache Web Server. You can user either Splunk Web to create the monitor input or edit the inputs.conf directly.
Configure monitoring input through Splunk Web¶
Configure file monitoring inputs on your data collection node for the Apache Web Server access and error log file.
Configure access log input¶
Configure file monitoring inputs on your data collection node for the Apache Web Server access log file.
- Log into Splunk Web.
- Select Settings > Data inputs > Files & directories.
- Click New.
- Click Browse next to the File or Directory field.
-
Navigate to the access log file generated by the Apache Web Server and click Next.
Note
The default location of the access log file may vary from different system. The default location of access log usually is
/var/log/apache/access.logor/var/log/apache2/access.log, but your path may differ. -
On the Input Settings page, next to Source type, click Select.
-
From the Select Source Type drop-down, select Web, then
apache:access:kvorapache:access:json, andapache:error, or type these source types in the search field.Note
You can select the
apache:access:jsonformatting option only after completing the apache:access:json formatting configuration steps from the Configure log formatting on the Apache Web Server using httpd.conf. -
Select Review.
- After you review the information, select Submit.
Configure error log inputs¶
Configure file monitoring inputs on your data collection node for the Apache Web Server error log file.
- Log into Splunk Web.
- Select Settings > Data inputs > Files & directories.
- Click New.
- Click Browse next to the File or Directory field.
-
Navigate to the error log file generated by the Apache Web Server and click Next.
Note
The default location of the error log file may vary from different system. The default location of error log usually is
/var/log/apache/error.logor/var/log/apache2/error.log, but your path may differ. And Apache Web Server may have multiple access logs and error logs, you can add an asterisk wildcard at the end of file name to retrieve all log data. -
On the Input Settings page, next to Source type, click Select.
-
From the Select Source Type drop-down, select Web, then
apache:access:kvorapache:access:json, andapache:error, or type these source types in the search field.Note
You can select the apache:access:json formatting option only after completing the apache:access:json formatting configuration steps from the Configure log formatting on the Apache Web Server using httpd.conf topic in this manual.
-
Select Review.
- After you review the information, select Submit.
Configure monitoring input through inputs.conf¶
You can create an inputs.conf file and configure the monitor input in this file instead of using Splunk Web.
- Using a text editor, create a file named
inputs.confin the$SPLUNK_HOME/etc/apps/Splunk_TA_apache/localfolder. -
Add the following stanza and lines, replacing
<path>with the actual path to access log and error log, and save the file.Note
You can add an asterisk wildcard at the end of the file name to retrieve all log data.
[monitor://<path>] sourcetype=apache:error disabled = 0 [monitor://<path>] sourcetype=apache:access:kv disabled = 0You can select the
apache:access:combinedoption for the default out-of-the-box events. For theapache:access:jsonformatting option, users can only select this after completing theapache:access:jsonformatting configuration steps in enhanced log formatting on the Apache Web Server using httpd.conf. -
Restart the Splunk platform for the new input to take effect.
Ended: Configuration
Troubleshooting ↵
Troubleshoot the Splunk Add-on for Apache Web Server¶
General troubleshooting¶
For helpful troubleshooting tips that you can apply to all add-ons, see Troubleshooting in Splunk Add-ons. For additional resources, see Support and resource links for add-ons in Splunk Add-ons.
Data not coming in¶
Verify that your source type is set to apache:access:* or apache:error.
Ended: Troubleshooting
Reference ↵
Lookups for the Splunk Add-on for Apache Web Server¶
The Splunk Add-on for Apache Web Server has one lookup, the http status lookup, which located in $SPLUNK_HOME/etc/apps/Splunk_TA_apache/lookups/apache_httpstatus.csv
| Filename | Description |
|---|---|
apache_httpstatus.csv |
Maps http status to status_description and status_type |
Source types for the Splunk Add-on for Apache Web Server¶
The Splunk Add-on for Apache Web Server provides the index-time and search-time knowledge for Apache Web Server events, metadata, user and group information, collaboration data, and tasks in the following formats.
| Source type | Description | CIM data models |
|---|---|---|
apache:access |
The server access log records all requests processed by the server, the location and content of the access. | Web |
apache:error |
The server error log sends diagnostic information and records any errors that it encounters in processing requests. | None |
apache:access:kv |
Apache httpd detailed server access log information in KV format. | Web |
apache:access:json |
Apache httpd detailed server access log information in JSON format. | Web |
apache:access:combined |
Apache httpd detailed server access log in Out-of-the-box default format. | None |