Splunk Universal Forwarder

Curious about Splunk® Universal Forwarders? This article will sum up what they are, why to use them and how the universal forwarder works. Importantly, we’ll point you to the very best tips, tricks and resources on using universal forwarders (and other ways) to get data into Splunk.

Download Universal Forwarder Now (FREE) >

For more info, keep reading for a full explanation on universal forwarders. As you go through this tutorial, some lingo might be new to you. You can check out Splexicon, the Splunk Glossary, for definitions and clarifications.

Getting data into Splunk Cloud Platform & Splunk Enterprise

The story of universal forwarders starts with a simple purpose: getting data into Splunk. Wondering what kind of data you can index in Splunk? The short answer is any kind.

Specifically, the Splunk platform, whether Splunk Cloud Platform or with Splunk Enterprise on-premises or cloud-deployed, can index and monitor all IT data, including streaming, machine and historical data. Examples of this data include:

OK, so Splunk can handle all your data — but how do you get it into Splunk? That’s where forwarders come in. Actually, there are four ways to get data in. The universal forwarder is the most common way.

Types of forwarders in Splunk

A forwarder is any Splunk Enterprise instance that forwards data to another Splunk Enterprise instance, such as:

Splunk Enterprise has three types of forwarders:

Let’s now turn to the universal forwarder, as it’s the primary way to send data into your Splunk Cloud Platform or Splunk Enterprise instance.

How a universal forwarder works

A universal forwarder collects data from a variety of places — whether data sources or other forwarders — and then sends it to a forwarder or a Splunk deployment. So, what can you do with universal forwarders? Capabilities include:

The current version of Splunk Universal Forwarder is free to download, as are previous versions.

(The most common configuration for the universal forwarder.)

When to use a universal forwarder

The universal forwarder is the best option when it comes to forwarding data to Indexers. According to our Splexicon:

The universal forwarder is a dedicated, streamlined version of Splunk Enterprise that contains only the essential components needed to forward data. The universal forwarder does not support python and does not expose a UI.

In most situations, the universal forwarder is the best way to forward data to indexers.

Benefits

The primary benefits of universal forwarders include reliability, security and broad platform support. You can easily install Splunk Universal Forwarders on a variety of diverse computing platforms and architectures.

Perhaps the biggest benefit is the scalability of our universal forwarders. Because they use significantly less hardware resources than other Splunk products, you can install literally thousands of them without a loss in network and host performance or cost. Part of its low resource usage is because the forwarder does not have a user interface.

In fact, universal forwarders can scale to tens of thousands of remote systems — making it a breeze to collect terabytes of data.

Drawbacks

The universal forwarder does have one significant limitation: it forwards only unparsed data. Which means, if you want to send event-based data to Indexers, you’ll have to use a heavy forwarder.

Installing universal forwarders

Here’s where to head for installing in various environments:

Get all the technical details on deploying, installing, configuring, forwarding and even troubleshooting with our Splunk Universal Forwarder Manual. Importantly, you can check all previous release documentation too! Simply look in the upper-right hand drop-down menu:

In this excellent Tech Talk, Gregg Daly, Technical Marketing Manager at Splunk, shows how to get data in from any linux or windows host, among other important tips to know:

Now let’s look at universal forwarders in two primary products, Splunk Cloud Platform and Splunk Enterprise.

Forwarders in Splunk Cloud Platform

For many use cases, plenty of data comes directly from files and directories. It’s best to use universal and heavy forwarders to monitor and send those to Splunk Cloud Platform. A best practice here is:

  1. Install universal forwarders on each machine where you need to monitor files and directories.
  2. Send that data to a heavy forwarder, which moves that data along into Splunk.

Learn more about getting data from files and directories and the other ways to get data in, including from network events, windows sources, metrics and HTTP Event Collector.

Forwarders in Splunk Enterprise

With Splunk Enterprise, you’re on-premises, so you can get your data into the instance directly or you can opt for universal and heavy forwarders. Generally, Splunk Enterprise inputs can be categorized like so:

Learn more about getting data into Splunk Enterprise on Splunk Lantern, or take the free eLearning course: Getting Data into Splunk.

Download Universal Forwarder Now (FREE) >

Splunk Universal Forwarder Resources

This is not the end of great resources for using universal forwarders. Here’s more Splunk destinations that can help you:

Related Articles

Advanced Encryption Standard & AES Rijndael Explained
Learn
3 Minute Read

Advanced Encryption Standard & AES Rijndael Explained

Learn all about AES Rijndael, today's go-to algorithm that won a NIST competition for ensuring data confidentiality — and it does much more than that!
Network Security Monitoring (NSM) Explained
Learn
4 Minute Read

Network Security Monitoring (NSM) Explained

Network security monitoring sounds like other security measures like intrusion detection. Find out why it's not — and what makes it so useful for IT today.
Cybercrime as a Service (CaaS) Explained
Learn
4 Minute Read

Cybercrime as a Service (CaaS) Explained

Perhaps unsurprisingly, cybercrime is now available for hire. Harnessing the ‘as a service’ model, find out how cybercrime can be enacted by practically anyone.
Cryptography 101: Key Principles, Major Types, Use Cases & Algorithms
Learn
6 Minute Read

Cryptography 101: Key Principles, Major Types, Use Cases & Algorithms

Cryptography underpins so many digital interactions — you might not even realize it. Get the full story on cryptography, use cases and emerging types.
Corporate Espionage: What You Need To Know
Learn
3 Minute Read

Corporate Espionage: What You Need To Know

Cyber threats are not only anonymous. Find out why people you know, and perhaps partner with, are spying on you — and whether it’s corporate espionage.
Cybersecurity Risk Management: 5 Steps for Assessing Risk
Learn
6 Minute Read

Cybersecurity Risk Management: 5 Steps for Assessing Risk

Don’t just guess your risk profile — assess it! Learn about cybersecurity risk management and apply these 5 steps to turn the process into an ongoing practice.
Denial-of-Service Attacks: History, Techniques & Prevention
Learn
4 Minute Read

Denial-of-Service Attacks: History, Techniques & Prevention

DoS attacks have a long history, but they’re also predicted to get worse in 2023. Find out the many ways they work and learn to prevent them in the first place.
Encryption Explained: At Rest, In Transit & End-To-End Encryption
Learn
4 Minute Read

Encryption Explained: At Rest, In Transit & End-To-End Encryption

Humans have encrypted messages for millennia. Today it’s essentially part of daily life. Understand how it works — and decide if you need end-to-end encryption.
What is DevOps Automation?
Learn
7 Minute Read

What is DevOps Automation?

Automation is essential to DevOps — but it’s not easy. This guide details how to automate DevOps and the best tools for the job so you can succeed in no time!