System requirements for use of Splunk Enterprise on-premises
Splunk supports using Splunk Enterprise on several computing environments. Learn about the supported environments before you download the software.
The universal forwarder has its own set of hardware requirements. See Universal forwarder system requirements in the Universal Forwarder manual.
If you have ideas or requests for new features, use the Splunk Ideas portal to search for, vote on, and request new enhancements (called an idea) for any of the Splunk solutions. See Splunk Ideas in the Get Started with Splunk Community manual.
Supported Operating Systems
The following tables list the available computing platforms for Splunk Enterprise. The first table lists availability for *nix operating systems and the second lists availability for Windows operating systems.
Each table shows available computing platforms (operating system and architecture) and types of Splunk software. A bold X in a box that intersects the computing platform and Splunk software type you want means that Splunk software is available for that platform and type.
An empty box means that Splunk software is not available for that platform and type.
If you do not see the operating system or architecture that you are looking for in the list, the software is not available for that platform or architecture. This might mean that Splunk has ended support for that platform. See the list of deprecated and removed computing platforms in Deprecated Features in the Release Notes.
Some boxes contain characters other than a bold X. See the bottom of each table to learn what the characters mean and how that could affect your installation.
Confirm support for your computing platform
- Find the operating system on which you want to install Splunk Enterprise in the Operating system column.
- Find the computing architecture in the Architecture column that matches your environment.
- Find the type of Splunk software that you want to use: Splunk Enterprise, Splunk Free, Splunk Trial, or Splunk Universal Forwarder.
- If Splunk software is available for the computing platform and software type that you want, proceed to the download page to get it.
Unix operating systems
Operating system | Architecture | Enterprise License | Free License | Trial License | Universal Forwarder package |
---|---|---|---|---|---|
Linux, 5.x kernel versions 5.4 and higher | x86 (64-bit) | X | X | X | |
Linux, 5.x kernel version 5.x and higher | x86 (64-bit) | X | |||
Linux, all 3.x and 4.x kernel versions | x86 (64-bit) | X | X | X | X |
Linux, all 2.6 kernel versions | x86 (64-bit) | D | D | D | X |
macOS 10.15 | Intel | X | X | X | |
macOS 10.14 | Intel | X | X | X | |
PowerLinux, Little Endian kernel version 2.6 and higher | PowerPC | X | |||
FreeBSD 11 | x86 (64-bit) | X | |||
Solaris 11 | x86 (64-bit) | X | |||
SPARC | X | ||||
AIX 7.1 and 7.2 | PowerPC | X | |||
ARM Linux | ARMv6 (32-bit) | A | |||
ARM Linux | ARMv8 (64-bit) | X | |||
z/Linux, kernel version 3.0 and higher | s390x | X | |||
z/Linux, kernel version 2.6 | s390x | D |
X: Splunk software is available for the platform.
D: Splunk supports this platform and architecture, but might remove support in a future release. See Deprecated Features in the Release Notes for information on deprecation.
A: The universal forwarder for this platform is available for download from splunk.com, but there is no official support for the platform.
An empty box indicates software is not supported for this platform.
Windows operating systems
The table lists the Windows computing platforms that Splunk Enterprise supports.
Operating system | Architecture | Enterprise License | Free License | Trial License | Universal Forwarder package |
---|---|---|---|---|---|
Windows Server 2016 and Server 2019 (all installation options) | x86 (64-bit) | X | X | X | X |
Windows 10 | x86 (64-bit) | X | X | X | |
x86 (32-bit) | X | ||||
Windows Server 2012 R2 | x86 (64-bit) | X |
X: Splunk software is available for the platform.
An empty box indicates software is not supported for this platform.
Containerized computing platforms
The official repository containing Dockerfiles for building Splunk Enterprise and Universal Forwarder images can be found on Splunk-Docker on GitHub. The list of requirements for Docker and Splunk software is available in the Support Guidelines on the Splunk-Docker GitHub.
For container orchestration, the Splunk Operator for Kubernetes on GitHub enables you to quickly and easily deploy Splunk Enterprise on your choice of private or public cloud provider. The operator simplifies scaling and management of Splunk Enterprise by automating workflows while implementing Kubernetes best practices.
Splunk Enterprise architecture support | Product |
---|---|
A single instance Splunk Enterprise deployment. | Splunk-Docker on GitHub |
A distributed or single instance Splunk Enterprise deployment. | Splunk Operator for Kubernetes on GitHub |
Operating system notes
Windows
Some parts of Splunk Enterprise on Windows require elevated user permissions to function properly. See the following topics for information on the components that require elevated permissions and how to configure Splunk Enterprise on Windows:
- Splunk Enterprise architecture and processes
- Choose the Windows user Splunk Enterprise should run as
- Considerations for deciding how to monitor remote Windows data in Getting Data In
Operating systems that support the Monitoring Console
The Splunk Enterprise Monitoring Console works only on some versions of Linux and Windows. For information on supported platform architectures for the Monitoring Console, see Supported platforms in the Troubleshooting Manual. To learn about the other prerequisites for the Monitoring Console, see Monitoring Console setup prerequisites in Monitoring Splunk Enterprise.
Deprecated operating systems and features
As we update Splunk software, we sometimes deprecate and remove support of older operating systems. See Deprecated features in the Release Notes for information on which platforms and features have been deprecated or removed entirely.
Creating and editing configuration files on OSes that do not use UTF-8 character set encoding
Splunk software expects configuration files to be in ASCII or Universal Character Set Transformation Format-8-bit (UTF-8) format. If you edit or create a configuration file on an OS that does not use UTF-8 character set encoding, then ensure that the editor you use can save in ASCII or UTF-8.
IPv6 platform support
All Splunk-supported OS platforms can use IPv6 network configurations.
See Configure Splunk Enterprise for IPv6 in the Admin Manual for details on IPv6 support in Splunk Enterprise.
Supported browsers
Splunk Enterprise supports the following browsers:
- Firefox (latest)
- Internet Explorer 11 (Splunk Enterprise does not support this browser in Compatibility Mode.)
- Safari (latest)
- Chrome (latest)
Recommended hardware
To evaluate Splunk Enterprise for a production deployment, use hardware that is typical of your production environment. This hardware should meet or exceed the recommended hardware capacity specifications. See Reference hardware in the Capacity Planning Manual.
For a discussion of hardware planning for production deployment, see Introduction to capacity planning for Splunk Enterprise in the Capacity Planning Manual.
Splunk Enterprise and virtual machines
If you run Splunk Enterprise in a virtual machine (VM) on any platform, performance decreases. This is because virtualization works by providing hardware abstraction on a machine into pools of resources. VMs that you define on the system draw from these resource pools. Splunk Enterprise needs sustained access to a number of resources, particularly disk I/O, for indexing operations. If you run Splunk Enterprise in a VM or alongside other VMs, indexing and search performance can degrade.
Splunk Enterprise and containerized infrastructures
A containerized deployment must provide hardware resources that meet or exceed the recommended hardware capacity for Splunk Enterprise deployments. See Containerized computing platforms.
Recommended hardware capacity
For information on hardware requirements for production deployments, see Reference hardware in the Capacity Planning Manual.
Hardware requirements for universal forwarders
The universal forwarder has its own set of hardware requirements. See Universal forwarder system requirements in the Universal Forwarder manual.
Supported file systems
If you run Splunk Enterprise on a file system that does not appear in this table, the software might run a startup utility named locktest
to test the viability of the file system. If locktest
fails, then the file system is not suitable for using with Splunk Enterprise.
Platform | File systems |
---|---|
Linux | ext3, ext4, btrfs, XFS, NFS 3/4 |
Solaris (universal forwarder only) | UFS, ZFS, VXFS, NFS 3/4 |
FreeBSD (universal forwarder only) | FFS, UFS, NFS 3/4, ZFS |
Mac OS X | HFS, APFS, NFS 3/4 |
AIX (universal forwarder only) | JFS, JFS2, NFS 3/4 |
Windows | NTFS, FAT32 |
Considerations regarding Network File System (NFS)
When you use Network File System (NFS) as a storage medium for Splunk indexing, consider all of the ramifications of file level storage.
Use block level storage rather than file level storage for indexing your data.
In environments with reliable, high-bandwidth, low-latency links, or with vendors that provide high-availability, clustered network storage, NFS can be an appropriate choice. However, customers who choose this strategy should work with their hardware vendor to confirm that their storage platform operates to the vendor specification in terms of both performance and data integrity.
If you use NFS, note the following:
- Do not use NFS to host hot or warm index buckets. Splunk Enterprise on NFS is supported only with cold or frozen buckets.
- Do not use NFS to share cold or frozen index buckets amongst an indexer cluster, as this potentially creates a single point of failure.
- Splunk Enterprise does not support "soft" NFS mounts. These are mounts that cause a program attempting a file operation on the mount to report an error and continue in case of a failure.
- Only "hard" NFS mounts, where the client continues to attempt to contact the server in case of a failure, are reliable with Splunk Enterprise.
- Do not disable attribute caching. If you have other applications that require disabling or reducing attribute caching, then you must provide Splunk Enterprise with a separate mount with attribute caching enabled.
- Do not use NFS mounts over a wide area network (WAN). Doing so causes performance issues and can lead to data loss.
Considerations regarding system-wide resource limits on *nix systems
Splunk Enterprise allocates system-wide resources like file descriptors and user processes on *nix systems for monitoring, forwarding, deploying, and searching. The ulimit
command controls access to these resources which must be tuned to acceptable levels for Splunk Enterprise to perform adequately on *nix systems.
The more tasks your Splunk Enterprise instance performs, the more resources it needs. You should increase the ulimit
values if you start to see your instance run into problems with low resource limits. See I get errors about ulimit in splunkd.log in the Troubleshooting Manual.
The following table shows the system-wide resources that Splunk Enterprise uses. It provides the minimum recommended settings for these resources for instances that are not forwarders, such as indexers, search heads, cluster masters, license masters, deployment servers, and Monitoring Consoles (MC).
System-wide Resource | ulimit invocation | Minimum recommended value |
---|---|---|
Open files | ulimit -n
|
64000 |
User processes | ulimit -u
|
16000 |
Data segment size | ulimit -d
|
The maximum RAM you want Splunk Enterprise to allocate in kilobytes. For example, 8GB is 8000000 .
|
File size | ulimit -f
|
-1 A setting of -1 sets the file size to unlimited.
|
On machines that run Linux where Splunk Enterprise services are managed by systemd, you can update the /etc/systemd/system/Splunkd.service
unit file to set the values shown in the table below. Review the values and adjust them depending on the machine resources available.
System-wide Resource | systemd unit file parameter | Minimum recommended value |
---|---|---|
Open files | LimitNOFILE=
|
64000 |
User processes | LimitNPROC=
|
16000 |
Data segment size | LimitDATA=
|
The maximum RAM you want Splunk Enterprise to allocate in bytes. For example, 8GB is 8000000000 .
|
File size | LimitFSIZE=
|
infinity A setting of "infinity" sets the file size to unlimited.
|
Total threads | TasksMax=
|
The maximum number of tasks that a service can create. This setting aligns with the user process limit LimitNPROC and the value can be set to match. For example, 16000 .
|
On machines that run FreeBSD, you might need to increase the kernel parameters for default and maximum process stack size. The following table shows the parameters that must be present in /boot/loader.conf
on the host.
System-wide Resource | Kernel parameter | Recommended value |
---|---|---|
Default process data size (soft limit) | dfldsiz
|
2147483648 |
Maximum process data size (hard limit) | maxdsiz
|
2147483648 |
On machines that run AIX, you might need to increase the systemwide resource limits for maximum file size (fsize) and resident memory size (rss). The following table shows the parameters that must be present in /etc/security/limits
for the user that runs Splunk software.
System-wide Resource | ulimit invocation | Recommended value |
---|---|---|
Data segment size | ulimit -d
|
1073741824 |
Resident memory size | ulimit -m
|
536870912 |
Number of open files | ulimit -n
|
8192 |
File size limit | ulimit -f
|
-1 (unlimited)
|
This consideration is not applicable to Windows-based systems.
Considerations regarding solid state disk drives
Solid state drives (SSDs) deliver significant performance gains over conventional hard drives for Splunk in "rare" searches - searches that request small sets of results over large swaths of data - when used in combination with Bloom filters. They also deliver performance gains with concurrent searches overall.
Considerations regarding Common Internet File System (CIFS)/Server Message Block (SMB)
Splunk Enterprise supports the use of the CIFS/SMB protocol for the following purposes, on shares hosted by Windows hosts only:
- Storage of cold or frozen Index buckets.
When you use a CIFS resource for storage, confirm that the resource has write permissions for the user that connects to the resource at both the file and share levels. If you use a third-party storage device, confirm that its implementation of CIFS is compatible with the implementation that your Splunk Enterprise instance runs as a client.
Do not index data to a mapped network drive on Windows (for example "Y:\
" mapped to an external share.) Splunk Enterprise disables any index it encounters with a non-physical drive letter.
Considerations regarding environments that use the transparent huge pages memory management scheme
If you run Splunk Enterprise on a Unix machine that makes use of transparent huge memory pages, see Transparent huge memory pages and Splunk performance in the Release Notes before you attempt to install Splunk Enterprise.
This consideration is not applicable to Windows operating systems.
Further reading
See the Download Splunk Enterprise page to get the latest available version.
See the release notes for details on known and resolved issues in this release.
See Introduction to Capacity Planning for Splunk Enterprise in the Capacity Planning Manual for information on estimating capacity .
This documentation applies to the following versions of Splunk® Enterprise: 8.1.0, 8.1.1, 8.1.2, 8.1.3, 8.1.4, 8.1.5, 8.1.6, 8.1.7, 8.1.8, 8.1.9, 8.1.10, 8.1.11, 8.1.12, 8.1.13, 8.1.14
Feedback submitted, thanks!