O'Reilly logo

Splunk 7 Essentials - Third Edition by Betsy Page Sigman, Erickson Delgado, J-P Contreras

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Generating an HEC authentication token

Next, you will generate an HEC authentication token. The HEC token will ensure no unknown applications have their data indexed if it arrives at your Splunk server on the assigned port. The HEC authentication token is sent in the HTTP header of the incoming request to Splunk. Without this token, the Splunk response would typically indicate a status code 401 (unauthorized error).

The HEC token will also enable you to override the source tag of all incoming data. This makes it easy to differentiate data streams later, based on where the data is coming from. It is best practice to create a separate token for each application. If something goes wrong with one application, say it starts flooding your Splunk ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required