Getting Data In

Newbie question: Push changes from UI to Indexers

ssdarkside2
Explorer

I used Azure/Splunk Enterprise deployment to set up Splunk on my Azure instance.

I then did this:

  1. Settings > Show All Settings
  2. Create an index via Settings > Indexes (Type: Events, ensured it is enabled)
  3. Create an HTTP Event Collector via Settings > Data Inputs > HTTP Event Collector
  4. Attempt to run a curl to the hec Public IP Address Azure Resource that was created

I get:

{"text":"Invalid token","code":4}

Based on what I was reading, I need to push the change out to the Indexers.

So here's my questions:

  • Can I do that through the UI?
  • Do I need to update each of the indexers manually?
  • Is there an alternative location for setting this up I am missing?

Thanks for helping a newbie!

Labels (1)
0 Karma
1 Solution

richgalloway
SplunkTrust
SplunkTrust

When you set up HEC on the search head, Splunk added a stanza to inputs.conf for you.  Copy that stanza to indexes.conf in an app and install that app on your indexers (use the Cluster Manager if you have one).  All indexers should then have the same HEC settings.

---
If this reply helps you, Karma would be appreciated.

View solution in original post

richgalloway
SplunkTrust
SplunkTrust

When you set up HEC on the search head, Splunk added a stanza to inputs.conf for you.  Copy that stanza to indexes.conf in an app and install that app on your indexers (use the Cluster Manager if you have one).  All indexers should then have the same HEC settings.

---
If this reply helps you, Karma would be appreciated.
Get Updates on the Splunk Community!

Preparing your Splunk Environment for OpenSSL3

The Splunk platform will transition to OpenSSL version 3 in a future release. Actions are required to prepare ...

Deprecation of Splunk Observability Kubernetes “Classic Navigator” UI starting ...

Access to Splunk Observability Kubernetes “Classic Navigator” UI will no longer be available starting January ...

Now Available: Cisco Talos Threat Intelligence Integrations for Splunk Security Cloud ...

At .conf24, we shared that we were in the process of integrating Cisco Talos threat intelligence into Splunk ...