Splunk® Enterprise

Forwarding Data

Splunk Enterprise version 7.1 is no longer supported as of October 31, 2020. See the Splunk Software Support Policy for details. For information about upgrading to a supported version, see How to upgrade Splunk Enterprise.

Deploy a heavy forwarder

You can enable a heavy forwarder on a full Splunk Enterprise instance. Enabling a heavy forwarder lets you perform all of the other tasks that the indexer is capable of, such as indexing, data routing, and transformation. This is unlike a universal forwarder, which can't index data at all and has limited data manipulation capability as a result of its reduced footprint.

To enable forwarding and receiving, you must configure both a receiver and a forwarder. The receiver is the Splunk instance that receives the data; the forwarder sends data to the receiver. The receiver must be another Splunk Enterprise instance, you can't forward data to the same machine unless that machine has another Splunk Enterprise instance running on it.

A Splunk best practice is to set up the receiver first, as described in Enable a receiver. You can then set up forwarders to send data to that receiver.

Setting up a heavy forwarder is a two step process:

  1. Install a full Splunk Enterprise instance.
  2. Enable forwarding on the instance.

There isn't an option to install a heavy forwarder.

Set up forwarding

You can use Splunk Web or the Splunk CLI to enable forwarding for a Splunk Enterprise instance.

You can also enable, as well as configure, forwarding by creating an outputs.conf file on the Splunk instance. Although setting up forwarders with outputs.conf requires more initial knowledge, there are advantages to performing all forwarder configurations in a single location. Most advanced configuration options are available only through outputs.conf. In addition, if you enable and configure a number of forwarders, you can easily accomplish this by editing a single outputs.conf file and making a copy for each forwarder. See Configure forwarders with outputs.conf for more information.

Set up heavy forwarding with Splunk Web

  1. Log into Splunk Web as an administrative user on the instance that is to forward data.
  2. Select Settings > Forwarding and receiving.
  3. Select Add new at Configure forwarding.
  4. Enter the host name or IP address for the receiving Splunk instance, along with the receiving port that you specified when you configured the receiver. For example, you might enter: receivingserver.com:9997. To implement load-balanced forwarding, you can enter multiple hosts as a comma-separated list.
  5. Select Save.

Configure heavy forwarders to index and forward data

A heavy forwarder has an advantage over light and universal forwarders in that it can index your data locally, as well as forward the data to another index. Local indexing is turned off by default. If you want to store data on the forwarder, you must enable that capability, either as described in "Set up heavy forwarding with Splunk Web" earlier in this topic, or by editing the outputs.conf configuration file, which controls forwarding outputs.

  1. Log into Splunk Web as an administrative user on the instance that is to forward data.
  2. Select Settings > Forwarding and receiving.
  3. Select Forwarding defaults.
  4. Select Yes to store and maintain a local copy of the indexed data on the forwarder.

You must perform any further configuration of forwarding while indexing in the outputs.conf file.

Set up heavy forwarding with the CLI

With the CLI, enable forwarding on the Splunk Enterprise instance as follows, then configure forwarding to a specified receiver.

  1. From a command or shell prompt, navigate to the $SPLUNK_HOME/bin/ directory.
  2. Type in the following to enable forwarding:
    splunk enable app SplunkForwarder -auth <username>:<password>
    
  3. Restart Splunk Enterprise.

Start forwarding activity from the CLI

The following procedure sends data to the receiving indexer that you specify. Before you can send data to a receiver,

  1. From a shell or command prompt, go to the $SPLUNK_HOME/bin directory.
  2. Specify the receiver with the splunk add forward-server command:
    splunk add forward-server <host>:<port> -auth <username>:<password>
    
  3. After invoking either of these commands, restart the forwarder.

Stop forwarding activity from the CLI

To end forwarding activity, enter:

splunk remove forward-server <host>:<port> -auth <username>:<password>

Disable forwarding from the CLI

Even if you stop forwarding activity, the instance remains configured as a forwarder. To revert the forwarder to a full Splunk Enterprise instance, use the disable command, as described earlier in this topic.

  1. From a command or shell prompt, go to the $SPLUNK_HOME/bin directory.
  2. Type in the following to disable forwarding:
    splunk disable app SplunkForwarder -auth <username>:<password>
    

By disabling forwarding, this command reverts the forwarder to a full Splunk Enterprise instance.

Last modified on 01 September, 2022
Enable a receiver   Deploy a light forwarder

This documentation applies to the following versions of Splunk® Enterprise: 7.0.0, 7.0.1, 7.0.2, 7.0.3, 7.0.4, 7.0.5, 7.0.6, 7.0.7, 7.0.8, 7.0.9, 7.0.10, 7.0.11, 7.0.13, 7.1.0, 7.1.1, 7.1.2, 7.1.3, 7.1.4, 7.1.5, 7.1.6, 7.1.7, 7.1.8, 7.1.9, 7.1.10, 7.2.0, 7.2.1, 7.2.2, 7.2.3, 7.2.4, 7.2.5, 7.2.6, 7.2.7, 7.2.8, 7.2.9, 7.2.10, 7.3.0, 7.3.1, 7.3.2, 7.3.3, 7.3.4, 7.3.5, 7.3.6, 7.3.7, 7.3.8, 7.3.9, 8.0.0, 8.0.1, 8.0.2, 8.0.3, 8.0.4, 8.0.5, 8.0.6, 8.0.7, 8.0.8, 8.0.9, 8.0.10, 8.1.1, 8.1.2, 8.1.3, 8.1.4, 8.1.5, 8.1.6, 8.1.7, 8.1.8, 8.1.9, 8.1.13, 8.1.14, 8.2.0, 8.2.1, 8.2.2, 8.2.3, 8.2.4, 8.2.5, 8.2.6, 8.2.7, 8.2.8, 8.2.9, 8.2.10, 8.2.11, 8.2.12, 9.0.0, 9.0.1, 9.0.2, 9.0.3, 9.0.4, 9.0.5, 9.0.6, 9.0.7, 9.0.8, 9.0.9, 9.0.10, 9.1.0, 9.1.1, 9.1.2, 9.1.3, 9.1.4, 9.1.5, 9.1.6, 9.2.0, 9.2.1, 9.2.2, 9.2.3, 9.3.0, 9.3.1, 8.1.0, 8.1.10, 8.1.11, 8.1.12


Was this topic useful?







You must be logged into splunk.com in order to post comments. Log in now.

Please try to keep this discussion focused on the content covered in this documentation topic. If you have a more general question about Splunk functionality or are experiencing a difficulty with Splunk, consider posting a question to Splunkbase Answers.

0 out of 1000 Characters