Getting Data In

How to install the Universal Forwarder on a Windows Cluster

jasonstone
Explorer

I haven't been able to find a clear post on "How to install the Universal Forwarder on a Windows Cluster".
Does anyone know what the best practices are?

Thanks

bsherwoodofdapt
Explorer

(for people who fall onto this question looking for similar information)

I would say it this way:

Treat your cluster as what it really is. Multiple physical nodes. Place a forwarder on each physical node.

You don't get the data specific to the virtualized service in the cluster, you just get data for the physical nodes. You can deduce on your own which server may host the virtual service at the time.

This is what I am doing with my Windows 2k8 Failover Cluster. There has been no manipulation or installation of the forwarder within the cluster configuration, since there really is no value to that. (This is even more important to realize if you are running Active/Active clusters where each node is important enough to monitor separately)

rsennett_splunk
Splunk Employee
Splunk Employee

Have you read this section?

http://docs.splunk.com/Documentation/Splunk/5.0.2/Indexer/Useforwarderstogetyourdata

Best Practices for Cluster/Forwarder set-up mentioned throughout.

With Splunk... the answer is always "YES!". It just might require more regex than you're prepared for!
0 Karma
Career Survey
First 500 qualified respondents will receive a $20 gift card! Tell us about your professional Splunk journey.

Can’t make it to .conf25? Join us online!

Get Updates on the Splunk Community!

Community Content Calendar, September edition

Welcome to another insightful post from our Community Content Calendar! We're thrilled to continue bringing ...

Splunkbase Unveils New App Listing Management Public Preview

Splunkbase Unveils New App Listing Management Public PreviewWe're thrilled to announce the public preview of ...

Leveraging Automated Threat Analysis Across the Splunk Ecosystem

Are you leveraging automation to its fullest potential in your threat detection strategy?Our upcoming Security ...