
Setting up a heavy forwarder is a two step process: You can then set up forwarders to send data to that receiver. The receiver must be another Splunk Enterprise instance, you can't forward data to the same machine unless that machine has another Splunk Enterprise instance running on it.Ī Splunk best practice is to set up the receiver first, as described in Enable a receiver.

The receiver is the Splunk instance that receives the data the forwarder sends data to the receiver. To enable forwarding and receiving, you must configure both a receiver and a forwarder. This is unlike a universal forwarder, which can't index data at all and has limited data manipulation capability as a result of its reduced footprint. Enabling a heavy forwarder lets you perform all of the other tasks that the indexer is capable of, such as indexing, data routing, and transformation.
DESKTOP SPLUNK FORWARDER FULL
Start a session that SPS will audit to test your configuration, and verify that the data of the session appears in Splunk.You can enable a heavy forwarder on a full Splunk Enterprise instance. If the Splunk server becomes unaccessible, SPS will try to resend the data when the period set in Flush interval expires. From now on, SPS will forward session data to Splunk. Adjust this field as needed for your environment. By default, this is the hostname and domain name of the SPS appliance as set on the Basic Settings > Network > Naming page. Splunk will display the data received from SPS as it was received from the host set in the PAM hostname or IP address field. To use HTTPS encryption between SPS and Splunk and also verify the identity of the Splunk server, select SSL > With certificate validation, then click and upload the certificate of the Splunk server, or the certificate of the CA that issued the certificate of the Splunk server. To use HTTPS encryption between SPS and Splunk, select SSL > Without certificate validation. Since the data forwarded to Splunk contains sensitive information, One Identity recommends to use HTTPS encryption between SPS and Splunk. If your Splunk HTTP Event Collector accepts unencrypted HTTP connections, select SSL > Disabled.

On your Splunk interface, navigate to Settings > Data inputs > HTTP Event Collector. Sourcetype: The source type of the events the SPS fowards is balabit:event. Index: The One Identity Safeguard for Privileged Sessions App for Splunk creates the index automatically, with the name balabit_events. To help identify the source of the received data, the following settings are configured automatically in the One Identity Safeguard for Privileged Sessions App for Splunk: This will automatically enable and configure the HTTP Event Collector (HEC) in your Splunk installation, and create an HTTP Event Collector authentication token ("HEC token") that SPS will use.
DESKTOP SPLUNK FORWARDER INSTALL
Install the One Identity Safeguard for Privileged Sessions App for Splunk to your Splunk installation.

To configure SPS to forward session data to Splunk

One Identity recommends using the Universal SIEM forwarder instead. The Splunk forwarder will be deprecated as of version 6.4 of SPS and will be removed in that feature release. SPS does not send historical data to Splunk, only data from the sessions started after you complete this procedure. To configure SPS to forward session data to Splunk, complete the following steps. Using the One Identity Safeguard for Privileged Sessions App for Splunk you can integrate this data with your other sources, and access all your data related to privileged user activities from a single interface. SPS can forward session data to Splunk near real-time.
DESKTOP SPLUNK FORWARDER WINDOWS
