- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I used Azure/Splunk Enterprise deployment to set up Splunk on my Azure instance.
I then did this:
- Settings > Show All Settings
- Create an index via Settings > Indexes (Type: Events, ensured it is enabled)
- Create an HTTP Event Collector via Settings > Data Inputs > HTTP Event Collector
- Attempt to run a curl to the hec Public IP Address Azure Resource that was created
I get:
{"text":"Invalid token","code":4}
Based on what I was reading, I need to push the change out to the Indexers.
So here's my questions:
- Can I do that through the UI?
- Do I need to update each of the indexers manually?
- Is there an alternative location for setting this up I am missing?
Thanks for helping a newbie!
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content


When you set up HEC on the search head, Splunk added a stanza to inputs.conf for you. Copy that stanza to indexes.conf in an app and install that app on your indexers (use the Cluster Manager if you have one). All indexers should then have the same HEC settings.
If this reply helps you, Karma would be appreciated.
- Mark as New
- Bookmark Message
- Subscribe to Message
- Mute Message
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content


When you set up HEC on the search head, Splunk added a stanza to inputs.conf for you. Copy that stanza to indexes.conf in an app and install that app on your indexers (use the Cluster Manager if you have one). All indexers should then have the same HEC settings.
If this reply helps you, Karma would be appreciated.
