Forwarders are lightweight Splunk instances whose purpose is to consume data and forward it on to Splunk Enterprise indexers for further processing. They require minimal resources and have little impact on performance, so they can usually reside on the machines where the data originates.
For example, if you have a number of Apache servers generating data that you want to search centrally, you can install a Splunk Enterprise indexer and then set up forwarders on the Apache machines. The forwarders take the Apache data and send it on to the indexer, which then consolidates, stores, and makes it available for searching. Because of their light footprint, the forwarders have minimum performance impact on the Apache servers.
Similarly, you can install forwarders on your employees' Windows desktops. These can send logs and other data to a central Splunk Enterprise instance, where you can view the data as a whole to track malware or other issues.
What forwarders do
You can use forwarders to get data from remote machines. They represent a much more robust solution than raw network feeds, with their capabilities for:
- Tagging of metadata (source, sourcetype, and host)
- Configurable buffering
- Data compression
- SSL security
- Use of any available network ports
- Running scripted inputs locally
Forwarders consume data in the same way as any other Splunk Enterprise instance. They can handle exactly the same types of data as an indexer. The difference is that they usually do not index the data themselves. Instead, they just get the data and send it on to a central indexer, which does the indexing and searching. A single indexer can process data coming from many forwarders. For detailed information on forwarders, see the Fowarding Data manual.
In most Splunk Enterprise deployments, forwarders serve as the primary consumers of data. It's only in single-machine deployments that the indexer is likely to also be the main data consumer. In a large Splunk Enterprise deployment, you might have hundreds or even thousands of forwarders consuming data and forwarding it on to a group of indexers for consolidation.
How to configure forwarder inputs
As lightweight instances of Splunk Enterprise, forwarders have limited capabilities by design. For example, most forwarders do not include Splunk Web, so you do not have direct access to a UI for setting up the forwarder's data inputs. Here are the main ways that you can configure a forwarder's data inputs:
- Specify inputs during initial deployment. For Windows forwarders, you can specify common inputs during the installation process itself. For *nix forwarders, you can specify inputs directly after installation.
- Use the CLI.
- Edit inputs.conf.
- Deploy an app containing the desired inputs.
- Use Splunk Web on a full Splunk Enteprise test instance to configure the inputs and then distribute the resulting
inputs.conf
file to the forwarder itself.
For more information
For detailed information on forwarders, including use cases, typical topologies, and configurations, see "About forwarding and receiving" in the Forwarding Data manual.
For details on forwarder deployment, including how to use the deployment server to simplify distribution of configuration files and apps to multiple forwarders, see "Universal forwarder deployment overview" in the Forwarding Data manual.
For information on using forwarders for monitoring of remote Windows data, see "Considerations for deciding how to monitor remote Windows data".
Splunk is a software that enables, and manages search data from any application, server, and network device in no time. Splunk makes machine data reachable, utilizable and helpful to everyone. It’s the secure way to examine the enormous streams of machine data produced by technology infrastructure and IT systems-virtual, physical, and in the cloud. A number of corporations around the world use Splunk to scrutinize their end-to-end infrastructures, shun service outages and gain real-time critical insights into client’s experience, transactions and key business metrics.
ReplyDelete