I used Azure/Splunk Enterprise deployment to set up Splunk on my Azure instance. I then did this: Settings > Show All Settings Create an index via Settings > Indexes (Type: Events, ensured it is enabled) Create an HTTP Event Collector via Settings > Data Inputs > HTTP Event Collector Attempt to run a curl to the hec Public IP Address Azure Resource that was created I get: {"text":"Invalid token","code":4} Based on what I was reading, I need to push the change out to the Indexers. So here's my questions: Can I do that through the UI? Do I need to update each of the indexers manually? Is there an alternative location for setting this up I am missing? Thanks for helping a newbie!
... View more