Once the token is verified, the data is taken by Splunk from the request and indexed. It can then be analyzed and examined using the Splunk functionality you've been learning throughout this book.
Understanding the process at a high level, let's now get started with exactly how to do this with Splunk, step by step.
We will show you specifically how Splunk can be used to improve the functioning of a web company. You will learn to do the following:
- Enable the HEC
- Create an HEC token
- Perform basic cURL statements from the command line
- Enable and use indexer acknowledgement