Heavy and light forwarder capabilities
This topic describes the capabilities that come with heavy and light forwarders as well as what capabilities are disabled by default.
Heavy forwarder details
The heavy forwarder has all Splunk Enterprise functions and modules enabled by default, with the exception of the distributed search module. The file
$SPLUNK_HOME/etc/apps/SplunkForwarder/default/default-mode.conf includes this stanza:
[pipeline:distributedSearch] disabled = true
For a detailed view of the exact configuration, see the configuration files for the SplunkForwarder application in
Light forwarder details
The deprecated light forwarder disables most features of Splunk Enterprise. Specifically, the light forwarder:
- Disables event signing and checking whether the disk is full (
- Limits internal data inputs to
splunkdand metrics logs only (
- Disables all indexing (
- Does not use
transforms.confand does not fully parse incoming data, but the
CHARSET, CHECK_FOR_HEADER, NO_BINARY_CHECK, PREFIX_SOURCETYPE,and
- Disables the Splunk Web interface (
- Limits throughput to 256KBps (
- Disables the following modules in
[pipeline:indexerPipe] disabled_processors= indexandforward, diskusage, signing,tcp-output-generic-processor, syslog-output-generic-processor, http-output-generic-processor, stream-output-processor [pipeline:distributedDeployment] disabled = true [pipeline:distributedSearch] disabled = true [pipeline:fifo] disabled = true [pipeline:merging] disabled = true [pipeline:typing] disabled = true [pipeline:udp] disabled = true [pipeline:tcp] disabled = true [pipeline:syslogfifo] disabled = true [pipeline:syslogudp] disabled = true [pipeline:parsing] disabled_processors=utf8, linebreaker, header, sendOut [pipeline:scheduler] disabled_processors = LiveSplunks
These modules include the deployment server (but not the deployment client), distributed search, named pipes/FIFOs, direct input from network ports, and the scheduler.
The defaults for the light forwarder can be tuned to meet your needs by overriding the settings in
$SPLUNK_HOME/etc/apps/SplunkLightForwarder/default/default-mode.conf on a case-by-case basis.
Purge old indexes
When you convert an indexer instance to a light forwarder, among other things, you disable indexing. In addition, you lose access to any data that was previously indexed on that instance. However, the data still exists.
If you want to purge that data from your system, you must first disable the SplunkLightForwarder app, then run the CLI
clean command, and then renable the app. For information on the
clean command, see Remove indexed data from Splunk in the Managing Indexers and Clusters of Indexers manual.
Considerations for forwarding structured data
When you forward structured data (data with source types that use the
INDEXED_EXTRACTIONS feature) you must perform any parsing, extraction, or filtering changes on the forwarder, not the indexer. See Forward data extracted from header files in the Getting Data In manual.
Enable forwarding on a Splunk Enterprise instance
Enable a receiver
This documentation applies to the following versions of Splunk Cloud Platform™: 8.2.2112, 8.2.2201, 8.2.2202, 8.2.2203, 9.0.2205, 9.0.2208, 9.0.2209 (latest FedRAMP release), 9.0.2303
Feedback submitted, thanks!