Install and configure Splunk Universal Forwarder on a remote Ubuntu system to ingest /var/log/syslog into a centralized Splunk indexer. Learn how SOC teams centralize logs for threat monitoring and incident response.
- Remote Ubuntu Machine (with UF installed)
- Splunk Indexer Server (port 9997 open)
- Network Access between UF and Splunk
wget -O splunkforwarder-ubuntu.deb https://download.splunk.com/products/universalforwarder/releases/latest/linux/splunkforwarder-latest-linux-2.0-amd64.deb
sudo dpkg -i splunkforwarder-ubuntu.deb
cd /opt/splunkforwarder/bin
sudo ./splunk enable boot-start --accept-licensesudo ./splunk add forward-server <splunk-server-ip>:9997sudo ./splunk add monitor /var/log/syslog -index main -sourcetype syslog
sudo ./splunk add monitor /var/log/auth.log -index main -sourcetype authlog
sudo ./splunk restartOn the Splunk indexer machine, run:
sudo /opt/splunk/bin/splunk enable listen 9089
sudo /opt/splunk/bin/splunk list forward-serverUse the following query in Search & Reporting:
index=main sourcetype=syslog | table _time host sourcetype message
Centralized log collection allows analysts to correlate logs from multiple machines in one place, enhancing visibility.
It enables early detection of anomalies, faster investigations, and proactive threat hunting.
