We have a requirement where we need to deploy Splunk Solution only for Log management purpose (less 50 GB per day). We are planning to have two heavy log forwarder (one in primary and one in DR) which will take the feed from different log sources (Devices (Syslog) and Servers (UF)). The HLF will send the data to indexers for storage (one in each DC) through Network Load balancer to maintain the HA. Also, will send the data to another SIEM solution for correlation and monitoring purpose.
Is there any way that we can installed the Splunk in non-clustered mode with minimum overhead and making sure that we have all the logs as per the Log management requirement.
You have described what you need to do. You have 2 servers that ideally should be setup as Splunk UF, not HF. You have a load balancer between them with sticky sessions configured. They both have the same outputs.conf file to send to multiple indexer tiers like this:
defaultGroup = primary_indexers,secondary_indexers
server = your.primary.indexer1.here:9997,...,your.primary.indexerZ.here:9997
server = your.secondary.indexer1.here:9997,...,your.secondary.indexerZ.here:9997