1. Splunk Enterprise Documentation, Getting Data In Manual: In the section "Get syslog data into Splunk Enterprise," the documentation explicitly states the best practice: "For production environments, Splunk recommends that you configure a separate syslog server to receive the data, and then write the data to files. You can then use a Splunk universal forwarder to read the files and send the data on to a Splunk indexer." This confirms that an intermediate syslog server writing to files, monitored by a UF, is the recommended architecture for reliability and scalability. (See: Splunk Docs, Getting Data In, "Best practice: Use a dedicated syslog server").
2. Splunk Enterprise Documentation, Forwarding Data Manual: This manual details the roles of different forwarder types. It describes the Universal Forwarder as the best choice for collecting data from file-based sources and forwarding it with minimal resource consumption. It clarifies that UFs do not perform parsing, which should occur on the indexing tier. This supports using a UF over an HF for monitoring the files created by the syslog server. (See: Splunk Docs, Forwarding Data, "Types of forwarders").