Splunk® Universal Forwarder

Forwarder Manual

Download manual as PDF

This documentation does not apply to the most recent version of Forwarder. Click here for the latest version.
Download topic as PDF

Install a Windows universal forwarder remotely with a static configuration

You can install a universal forwarder remotely onto a Windows host with a static configuration.

There are several scenarios where you would install a universal forwarder with a static configuration:

  • You don't need to change the configuration later.
  • You will make any post-installation changes with a non-Splunk deployment tool such as System Center Configuration Manager, Altris, or BigFix/Tivoli.

For this type of installation, install the universal forwarder from the command line. Specify all configuration options and use silent mode (/quiet). See Install a Windows universal forwarder from the command line for instructions and a list of installation flags that the installer supports.

Install the universal forwarder with a static configuration

After you download the universal forwarder and plan your installation, install the forwarder:

1. Install and configure the universal forwarder on a test machine, using the command line interface and the flags you want.

2. Test and tune the installation.

3. Load the universal forwarder MSI file into your software deployment tool.

4. Specify the tested flags with your deployment tool.

5. Execute installation with your deployment tool.

Required installation flags

When you install a universal forwarder with a static configuration, specify the /quiet flag and a minimum of the following flags:

  • AGREETOLICENSE=Yes
  • RECEIVING_INDEXER="<server:port>"

If you do not plan to install an add-on into the forwarder, you also must include at least one data input flag, such as WINEVENTLOG_APP_ENABLE=1. See Install a Windows universal forwarder from the command line for a list of all available command line flags.

Example of remote installation with a static configuration

Install as the local system user, get events from the Security event log channel, and forward those events to an indexer

This example sets the universal forwarder to run as the Local System user, get events from the Windows Security and System event logs, send data to indexer1, and launch automatically:

msiexec.exe /i splunkuniversalforwarder_x86.msi RECEIVING_INDEXER="indexer1:9997" WINEVENTLOG_SEC_ENABLE=1 WINEVENTLOG_SYS_ENABLE=1 AGREETOLICENSE=Yes /quiet

Install with a secure configuration by specifying certificate files and authority

This example installs a secure configuration and specifies an SSL certificate:

msiexec.exe /i splunkuniversalforwarder.msi CERTFILE=<c:\path\to\certfile.pem> ROOTCACERTFILE=<c:\path\to\rootcacertfile.pem> CERTPASSWORD=<password> RECEIVING_INDEXER="indexer1:9997" WINEVENTLOG_SEC_ENABLE=1 AGREETOLICENSE=yes

For more information, see the list of supported command line flags.

Test the deployment

A Splunk best practice is to install a universal forwarder on one host and confirm that it works before installing forwarders on additional hosts.

1. After installing the forwarder, ensure that it gets the desired data and sends it to the indexer.

2. After you confirm that the forwarder works the way you want, continue installation of the forwarder software on the remaining hosts.

PREVIOUS
Install a Windows universal forwarder from the command line
  NEXT
Install a *nix universal forwarder

This documentation applies to the following versions of Splunk® Universal Forwarder: 6.4.0, 6.4.1, 6.4.2, 6.4.3, 6.4.4, 6.4.5, 6.4.6, 6.4.7, 6.4.8, 6.4.9, 6.4.10, 6.4.11, 6.5.0, 6.5.1, 6.5.2, 6.5.3, 6.5.4, 6.5.5, 6.5.6, 6.5.7, 6.5.8, 6.5.9, 6.5.10, 6.6.0, 6.6.1, 6.6.2, 6.6.3, 6.6.4, 6.6.5, 6.6.6, 6.6.7, 6.6.8, 6.6.9, 6.6.10, 6.6.11, 6.6.12, 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 7.0.5, 7.0.6, 7.0.7, 7.0.8, 7.0.9, 7.0.10, 7.0.11


Was this documentation topic helpful?

Enter your email address, and someone from the documentation team will respond to you:

Please provide your comments here. Ask a question or make a suggestion.

You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters