Skip to content

Commit

Permalink
Merge pull request #1037 from gravwell/release/v5.4.7
Browse files Browse the repository at this point in the history
Release/v5.4.8: Fix HTTP ingester token name
  • Loading branch information
michael-wisely-gravwell authored Jul 9, 2024
2 parents 4f3a75c + 91f1e9c commit e2b6bad
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion ingesters/http.md
Original file line number Diff line number Diff line change
Expand Up @@ -528,7 +528,7 @@ tag=gravwell syslog Appname==httpingester Message == "HEC request" Hostname

#### Token-Name

Many third party services which are designed to send data to a HEC compatible listener have been observed sending authentication tokens with various random names; the default expected authentication header structure is `Authentication: Splunk <token>`, but we have seen everything from "User" to "user_name". The `Token-Name` configuration parameter can override the Authorization header token name so that the HEC compatible listener can still authenticate and support third party services that do not adhere to the HEC guidance.
Many third party services which are designed to send data to a HEC compatible listener have been observed sending authentication tokens with various random names; the default expected authentication header structure is `Authorization: Splunk <token>`, but we have seen everything from "User" to "user_name". The `Token-Name` configuration parameter can override the Authorization header token name so that the HEC compatible listener can still authenticate and support third party services that do not adhere to the HEC guidance.

An example curl command that would authenticate with a `Token-Name` of `foobar` and a `TokenValue` of `soopersekrit` would be:

Expand Down

0 comments on commit e2b6bad

Please sign in to comment.