O'Reilly logo

Splunk 7 Essentials - Third Edition by Betsy Page Sigman, Erickson Delgado, J-P Contreras

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Using a token with data

In addition to the formatting of the event data, each data package will also need a token in its authorization header. The fact that the system is based on tokens means that the user doesn't have to include Splunk credentials in the application or in files that support the application, while also protecting Splunk from receiving events from unintended sources. The Splunk administrator will generate the token using Splunk and provide it to software application developers for use. 

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required