Integrate a universal forwarder onto a Linux system image
Start by deploying a small number of cloned systems.
The first time the universal forwarder starts in the cloned environment, ensure it uses unique GUIDs and the hostname. It prevents multiple universal forwarders from appearing as the same instance in the Splunk environment.
Customize the integration process to suit specific requirements of your company and document it.
Every time you upgrade the universal forwarder, test the integration process for each version.
Critical considerations
-
Prepare the universal forwarder for cloning properly because it ensures that the source and target systems use unique identifiers, such as GUIDs and hostnames. See Prepare the universal forwarder installation for cloning.
Note:In Splunk Enterprise versions 8.2 and higher, verify that running the clone-prep-clear-config command cleared the hostname from the inputs.conf file. If it failed to clear it, manually remove the inputs.conf file by running this command:
rm /opt/splunkforwarder/etc/system/local/inputs.conf
- Ensure cloned systems maintain proper file permissions. If you run the universal forwarder as a non-root user, ensure proper permissions by running this command:
sudo chown -R splunkfwd:splunkfwd /opt/splunkforwarder/ Ensure that the firewall settings on the cloned system allow the universal forwarder to connect to indexers.
Verify that the settings of token-based authentication are preserved during cloning.
Secure Sockets Layer (SSL) certificates that are tied to the hostname may require regeneration.