<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk CLI returns &amp;quot;Action forbidden&amp;quot; in Security</title>
    <link>https://community.splunk.com/t5/Security/Splunk-CLI-returns-quot-Action-forbidden-quot/m-p/558647#M12378</link>
    <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/236104"&gt;@busyninja&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you please try to store OP in file and see it has also same problem or not?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;/opt/splunk/bin/splunk search '| makeresults count=200 | eval a=1| accum a' -auth admin:admin123 -app 'search' -preview true -maxout 0 -header false &amp;gt; data1.txt&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Script&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;import os
output = os.popen(
    '/opt/splunk/bin/splunk search "| makeresults count=200 | eval a=1| accum a" -auth admin:admin123 -app "search" -maxout 0 -max_time 0 -header false -preview true &amp;gt; data2.txt').read()
print(output)&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;KV&lt;/P&gt;</description>
    <pubDate>Thu, 08 Jul 2021 07:15:48 GMT</pubDate>
    <dc:creator>kamlesh_vaghela</dc:creator>
    <dc:date>2021-07-08T07:15:48Z</dc:date>
    <item>
      <title>Splunk CLI returns "Action forbidden"</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CLI-returns-quot-Action-forbidden-quot/m-p/558381#M12361</link>
      <description>&lt;P&gt;I can query my Splunk instance using CLI with the following command:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;/opt/splunk/bin/./splunk search 'index=* host=* mitre_technique!=- | stats count BY mitre_technique | fields - count' -auth user:password -app 'custom_app' -preview true&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It returns results:&lt;/P&gt;&lt;P&gt;mitre_technique&lt;BR /&gt;---------------------------------------------------&lt;BR /&gt;T1003 - /etc/passwd and /etc/shadow&lt;BR /&gt;T1007 - System Service Discovery&lt;BR /&gt;T1011 - Exfiltration over Bluetooth&lt;BR /&gt;T1016 - Internet Connection Discovery&lt;BR /&gt;T1018 - Remote System Discovery&lt;BR /&gt;T1025 - Data from Removable Media&lt;BR /&gt;T1033 - System Owner/User Discovery&lt;BR /&gt;...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, if I run it from within a python script:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;print(subprocess.Popen(["/"+postpath+"splunk/bin/./splunk", "search", "'index=*", "host=*", "mitre_technique!=-", "|", "stats", "count", "BY", "mitre_technique", "|", "fields", "-", "count'", "-auth", splunkuser.strip()+":"+splunkpswd.strip(), "-app", "'custom_app'", "-preview", "true"]).communicate())&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;It returns:&lt;/P&gt;&lt;P&gt;"Action forbidden."&lt;/P&gt;&lt;P&gt;(None, None)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone know why this is? How can I get results returned from running the command in my python script?&lt;/P&gt;&lt;P&gt;Thank you in advance&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jul 2021 10:41:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CLI-returns-quot-Action-forbidden-quot/m-p/558381#M12361</guid>
      <dc:creator>busyninja</dc:creator>
      <dc:date>2021-07-06T10:41:03Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CLI returns "Action forbidden"</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CLI-returns-quot-Action-forbidden-quot/m-p/558383#M12362</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/236104"&gt;@busyninja&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you please try this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="python"&gt;import subprocess
cmd = [
    "/opt/splunk/bin/splunk", "search", "index=_internal earliest=-15m  | stats count BY sourcetype | fields - count", "-auth", "admin:admin123", "-app", "search", "-preview", "true"]
# cmd = ["/opt/splunk/bin/splunk", "status", "-auth", "admin:admin123"]

# cmd = ["/"+postpath+"splunk/bin/splunk", "search", "index=* host=* mitre_technique!=- | stats count BY mitre_technique | fields - count", "-auth", splunkuser.strip()+":"+splunkpswd.strip(), "-app", "custom_app", "-preview", "true"]
proc = subprocess.Popen(cmd, stdout=subprocess.PIPE)

while True:
    record = proc.stdout.readline()
    if not record:
        break
    print(record)
proc.wait()&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can try this also.&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;import os
stream = os.popen("/opt/splunk/bin/splunk search 'index=_internal earliest=-15m  | stats count BY sourcetype | fields - count' -auth admin:admin123 -app 'search' -preview true")
# stream = os.popen(
#     "/opt/splunk/bin/splunk status -auth admin:admin123")
output = stream.read()
print(output)&lt;/LI-CODE&gt;&lt;P&gt;Thanks&lt;BR /&gt;KV&lt;BR /&gt;▄︻̷̿┻̿═━一&lt;BR /&gt;&lt;BR /&gt;If any of my reply helps you to solve the problem Or gain knowledge, an upvote would be appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jul 2021 11:35:10 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CLI-returns-quot-Action-forbidden-quot/m-p/558383#M12362</guid>
      <dc:creator>kamlesh_vaghela</dc:creator>
      <dc:date>2021-07-06T11:35:10Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CLI returns "Action forbidden"</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CLI-returns-quot-Action-forbidden-quot/m-p/558437#M12363</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/127939"&gt;@kamlesh_vaghela&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Your second solution worked! Thank you&lt;/P&gt;&lt;P&gt;Although I now get results, they are only a subset of total results compared to the actual events returned in from running the command outside of the script. There are 64 events in total but only 23 shown from executing the CLI command from within the script, for the same search. Do you know why this is?&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jul 2021 15:15:36 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CLI-returns-quot-Action-forbidden-quot/m-p/558437#M12363</guid>
      <dc:creator>busyninja</dc:creator>
      <dc:date>2021-07-06T15:15:36Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CLI returns "Action forbidden"</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CLI-returns-quot-Action-forbidden-quot/m-p/558497#M12368</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/236104"&gt;@busyninja&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It should work from script as well. can you please share your sample search&amp;amp; script?&lt;/P&gt;&lt;P&gt;KV&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jul 2021 05:38:28 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CLI-returns-quot-Action-forbidden-quot/m-p/558497#M12368</guid>
      <dc:creator>kamlesh_vaghela</dc:creator>
      <dc:date>2021-07-07T05:38:28Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CLI returns "Action forbidden"</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CLI-returns-quot-Action-forbidden-quot/m-p/558513#M12370</link>
      <description>&lt;P&gt;My script is rather big but here is the command I run:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;mitre_techniques = os.popen('/'+postpath+'splunk/bin/./splunk search "index=* host=* mitre_technique!=- | stats count BY mitre_technique | fields - count" -auth '+splunkuser.strip()+':'+splunkpswd.strip()+' -app "custom_app" -maxout 0 -max_time 0 -header false').read()
print(mitre_techniques)&lt;/LI-CODE&gt;&lt;P&gt;Which returns 23 results&lt;/P&gt;&lt;P&gt;&lt;EM&gt;T1007 - System Service Discovery&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1018 - Remote System Discovery&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1053 - Scheduled Task&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1059 - PowerShell&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1059 - Windows Command Shell&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1070 - Network Share Connection Removal&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1106 - Native API&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1112 - Modify Registry&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1203 - Exploitation for Client Execution&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1204 - User Execution&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1216 - PubPrn&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1218 - Control Panel&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1218 - Msiexec&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1218 - Rundll32&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1489 - Service Stop&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1518 - Security Software Discovery&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1543 - Windows Service&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1546 - Accessibility Features&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1546 - Screensaver&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1548 - Bypass User Account Control&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1564 - Run Virtual Instance&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1569 - Service Execution&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1574 - Path Interception by Search Order Hijacking&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, I run the exact same command at the command line:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;sudo /opt/splunk/bin/./splunk search "index=* host=* mitre_technique!=- | stats count BY mitre_technique | fields - count" -auth admin:splunksplunk -app "custom_app" -maxout 0 -max_time 0 -header false&lt;/LI-CODE&gt;&lt;P&gt;I get 64 results:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;T1003 - /etc/passwd and /etc/shadow&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1007 - System Service Discovery&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1011 - Exfiltration over Bluetooth&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1016 - Internet Connection Discovery&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1018 - Remote System Discovery&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1025 - Data from Removable Media&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1033 - System Owner/User Discovery&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1052 - Exfiltration over Physical Medium&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1053 - Scheduled Task&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1056 - Keylogging&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1057 - Process Discovery&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1059 - PowerShell&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1059 - Windows Command Shell&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1069 - Domain Groups&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1069 - Local Groups&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1070 - Clear Linux or Mac System Logs&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1070 - File Deletion&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1070 - Network Share Connection Removal&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1083 - File and Directory Discovery&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1087 - Local Account&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1091 - Replication through Removable Media&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1105 - Ingress Tool Transfer&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1106 - Native API&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1112 - Modify Registry&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1113 - Screen Capture&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1200 - Hardware Additions&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1203 - Exploitation for Client Execution&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1204 - User Execution&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1216 - PubPrn&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1218 - Control Panel&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1218 - Msiexec&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1218 - Rundll32&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1485 - Data Destruction&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1489 - Service Stop&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1497 - Time Based Evasion&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1518 - Security Software Discovery&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1543 - Windows Service&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1546 - Accessibility Features&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1546 - Screensaver&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1546 - Unix Shell Configuration&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1547 - Dylib Hijacking&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1547 - Dynamic Linker Hijacking&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1547 - Kernel Modules and Extensions&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1547 - Message Modification&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1547 - Service Modification&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1547 - XDG Autostart Entries&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1548 - Bypass User Account Control&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1548 - Sudo and Sudo Caching&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1552 - Credentials in Files&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1552 - Private Keys&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1555 - Credentials from Password Stores&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1555 - Keychain&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1556 - Pluggable Authentication Modules&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1560 - Archive Collected Data&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1560 - Archive via Utility&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1562 - Disable of Modify Tools&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1564 - Hidden Users&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1564 - Run Virtual Instance&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1569 - Launchctl&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1569 - Service Execution&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1570 - Lateral Tool Transfer&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1573 - Asymmetric Cryptography&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1573 - Symmetric Cryptography&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;T1574 - Path Interception by Search Order Hijacking&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did notice something odd when running the command at the command line (not using the script). If I wrap the search query in single quotes (') I get 23 results but if I use double quotes (") I get 64 results...&lt;/P&gt;&lt;P&gt;But annoyingly, I get 23 results regardless of whether I use single or double quotes in the script.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jul 2021 08:46:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CLI-returns-quot-Action-forbidden-quot/m-p/558513#M12370</guid>
      <dc:creator>busyninja</dc:creator>
      <dc:date>2021-07-07T08:46:23Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CLI returns "Action forbidden"</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CLI-returns-quot-Action-forbidden-quot/m-p/558523#M12372</link>
      <description>&lt;P&gt;Strange.. Your scripts looks good. &amp;nbsp;with single quotes and double quotes the result set are same.&lt;/P&gt;&lt;P&gt;Try this.&lt;/P&gt;&lt;P&gt;CLIs&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;/opt/splunk/bin/splunk search "| makeresults count=200 | eval a=1| accum a" -auth admin:admin123 -app 'search' -preview true -maxout 0 -header false

/opt/splunk/bin/splunk search '| makeresults count=200 | eval a=1| accum a' -auth admin:admin123 -app 'search' -preview true -maxout 0 -header false&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Scripts&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;import os
output = os.popen(
    '/opt/splunk/bin/splunk search "| makeresults count=200 | eval a=1| accum a" -auth admin:admin123 -app "search" -maxout 0 -max_time 0 -header false -preview true').read()
print(output)&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;import os
output = os.popen(
    '/opt/splunk/bin/splunk search \'| makeresults count=200 | eval a=1| accum a\' -auth admin:admin123 -app "search" -maxout 0 -max_time 0 -header false -preview true').read()
print(output)&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;KV&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jul 2021 10:49:35 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CLI-returns-quot-Action-forbidden-quot/m-p/558523#M12372</guid>
      <dc:creator>kamlesh_vaghela</dc:creator>
      <dc:date>2021-07-07T10:49:35Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CLI returns "Action forbidden"</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CLI-returns-quot-Action-forbidden-quot/m-p/558538#M12373</link>
      <description>&lt;P&gt;Strange - all of those commands work on the command line and in the script.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jul 2021 12:22:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CLI-returns-quot-Action-forbidden-quot/m-p/558538#M12373</guid>
      <dc:creator>busyninja</dc:creator>
      <dc:date>2021-07-07T12:22:31Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CLI returns "Action forbidden"</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CLI-returns-quot-Action-forbidden-quot/m-p/558544#M12374</link>
      <description>&lt;P&gt;So I have changed my search slightly to carry out some more testing:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;/opt/splunk/bin/splunk search "index=* host=* mitre_technique!=-" -auth admin:password -app 'custom' -preview true -maxout 0 -header false&lt;/LI-CODE&gt;&lt;P&gt;I have the following results:&lt;/P&gt;&lt;P&gt;From Script:&lt;/P&gt;&lt;P&gt;&lt;EM&gt;07/14/09 01:39:29,N/A,C:/Windows/System32/reg.exe,N/A,True,c:/windows/system32/reg.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;07/14/09 01:14:31,N/A,C:/Windows/SysWOW64/rundll32.exe,N/A,True,c:/windows/syswow64/rundll32.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/20/10 12:17:00,N/A,C:/Windows/system32/cmd.exe,N/A,False,c:/windows/system32/cmd.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/20/10 12:17:00,N/A,C:/Windows/SysWOW64/cmd.exe,N/A,True,c:/windows/syswow64/cmd.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;06/06/11 17:55:30,N/A,C:/Program Files (x86)/Common Files/Adobe/Acrobat/ActiveX/AcroIEHelperShim.dll,N/A,False,c:/program files (x86)/common files/adobe/acrobat/activex/acroiehelpershim.dll&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/20/10 13:24:22,N/A,C:/Windows/System32/desk.cpl,N/A,False,c:/windows/system32/desk.cpl&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;07/14/09 01:39:35,N/A,C:/Windows/system32/sc.exe,N/A,True,c:/windows/system32/sc.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;06/10/09 20:39:47,N/A,C:/Windows/Microsoft.NET/Framework64/v2.0.50727/csc.exe,N/A,True,c:/windows/microsoft.net/framework64/v2.0.50727/csc.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;03/27/10 14:59:04,N/A,C:/Program Files/Microsoft Office/Office14/WINWORD.EXE,N/A,True,c:/program files/microsoft office/office14/winword.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;09/09/11 15:34:58,N/A,C:/Program Files (x86)/Internet Explorer/IELowutil.exe,N/A,True,c:/program files (x86)/internet explorer/ielowutil.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;07/14/09 01:38:53,N/A,C:/Windows/system32/scrnsave.scr,N/A,True,c:/windows/system32/scrnsave.scr&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;06/06/11 17:55:30,N/A,C:/Program Files (x86)/Adobe/Reader 10.0/Reader/AcroRd32.exe,N/A,False,c:/program files (x86)/adobe/reader 10.0/reader/acrord32.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;07/14/09 01:39:20,N/A,C:/WINDOWS/system32/WindowsPowerShell/v1.0/powershell.exe,N/A,False,c:/windows/system32/windowspowershell/v1.0/powershell.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/20/10 13:24:58,N/A,C:/Windows/system32/msiexec.exe,N/A,True,c:/windows/system32/msiexec.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/20/10 12:17:22,N/A,C:/Windows/system32/msiexec.exe,N/A,False,c:/windows/system32/msiexec.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/20/10 12:17:22,N/A,C:/Windows/SysWOW64/msiexec.exe,N/A,True,c:/windows/syswow64/msiexec.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/20/10 13:25:13,N/A,C:/Windows/System32/sdclt.exe,N/A,True,c:/windows/system32/sdclt.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/20/10 13:25:12,N/A,C:/Windows/system32/schtasks.exe,N/A,True,c:/windows/system32/schtasks.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;05/19/11 20:05:00,N/A,C:/Program Files (x86)/McAfee/Common Framework/McScript_InUse.exe,N/A,True,c:/program files (x86)/mcafee/common framework/mcscript_inuse.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;06/20/10 02:06:46,N/A,C:/Program Files (x86)/Adobe/Reader 9.0/Reader/AcroRd32.exe,N/A,False,c:/program files (x86)/adobe/reader 9.0/reader/acrord32.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;07/14/09 01:39:16,N/A,C:/Windows/system32/magnify.exe,N/A,False,c:/windows/system32/magnify.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;09/09/11 15:34:56,N/A,C:/Program Files/Internet Explorer/iexplore.exe,N/A,True,c:/program files/internet explorer/iexplore.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;09/09/11 15:35:02,N/A,C:/Program Files (x86)/Internet Explorer/iexplore.exe,N/A,True,c:/program files (x86)/internet explorer/iexplore.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;07/14/09 01:39:31,N/A,C:/Windows/System32/rundll32.exe,N/A,True,c:/windows/system32/rundll32.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/20/10 13:25:00,N/A,C:/Windows/system32/mstsc.exe,N/A,False,c:/windows/system32/mstsc.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;07/14/09 01:39:06,N/A,C:/Windows/system32/displayswitch.exe,N/A,False,c:/windows/system32/displayswitch.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/20/10 13:24:33,N/A,C:/Windows/system32/cmd.exe,N/A,True,c:/windows/system32/cmd.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;07/14/09 01:39:37,N/A,C:/Windows/system32/services.exe,N/A,True,c:/windows/system32/services.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/08/09 03:49:06,N/A,C:/Program Files/VMware/VMware Tools/VMwareService.exe,N/A,True,c:/program files/vmware/vmware tools/vmwareservice.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/08/09 03:49:46,N/A,C:/Program Files/VMware/VMware Tools/VMUpgradeHelper.exe,N/A,True,c:/program files/vmware/vmware tools/vmupgradehelper.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/08/09 03:49:02,N/A,C:/Program Files/VMware/VMware Tools/VMwareTray.exe,N/A,True,c:/program files/vmware/vmware tools/vmwaretray.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/08/09 03:49:28,N/A,C:/Program Files/VMware/VMware Tools/VMwareUser.exe,N/A,True,c:/program files/vmware/vmware tools/vmwareuser.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;07/14/09 01:14:42,N/A,C:/Windows/system32/tasklist.exe,N/A,False,c:/windows/system32/tasklist.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;07/14/09 01:14:42,N/A,C:/Windows/SysWOW64/tasklist.exe,N/A,True,c:/windows/syswow64/tasklist.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;07/14/09 01:38:52,N/A,C:/Windows/System32/wscui.cpl,N/A,False,c:/windows/system32/wscui.cpl&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/20/10 13:24:22,N/A,C:/Windows/System32/appwiz.cpl,N/A,False,c:/windows/system32/appwiz.cpl&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But from command line (not using script):&lt;/P&gt;&lt;P&gt;&lt;EM&gt;07/14/09 01:39:29,N/A,C:/Windows/System32/reg.exe,N/A,True,c:/windows/system32/reg.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;07/14/09 01:14:31,N/A,C:/Windows/SysWOW64/rundll32.exe,N/A,True,c:/windows/syswow64/rundll32.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/20/10 12:17:00,N/A,C:/Windows/system32/cmd.exe,N/A,False,c:/windows/system32/cmd.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/20/10 12:17:00,N/A,C:/Windows/SysWOW64/cmd.exe,N/A,True,c:/windows/syswow64/cmd.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;06/06/11 17:55:30,N/A,C:/Program Files (x86)/Common Files/Adobe/Acrobat/ActiveX/AcroIEHelperShim.dll,N/A,False,c:/program files (x86)/common files/adobe/acrobat/activex/acroiehelpershim.dll&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/20/10 13:24:22,N/A,C:/Windows/System32/desk.cpl,N/A,False,c:/windows/system32/desk.cpl&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;07/14/09 01:39:35,N/A,C:/Windows/system32/sc.exe,N/A,True,c:/windows/system32/sc.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;06/10/09 20:39:47,N/A,C:/Windows/Microsoft.NET/Framework64/v2.0.50727/csc.exe,N/A,True,c:/windows/microsoft.net/framework64/v2.0.50727/csc.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;03/27/10 14:59:04,N/A,C:/Program Files/Microsoft Office/Office14/WINWORD.EXE,N/A,True,c:/program files/microsoft office/office14/winword.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;09/09/11 15:34:58,N/A,C:/Program Files (x86)/Internet Explorer/IELowutil.exe,N/A,True,c:/program files (x86)/internet explorer/ielowutil.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;07/14/09 01:38:53,N/A,C:/Windows/system32/scrnsave.scr,N/A,True,c:/windows/system32/scrnsave.scr&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;06/06/11 17:55:30,N/A,C:/Program Files (x86)/Adobe/Reader 10.0/Reader/AcroRd32.exe,N/A,False,c:/program files (x86)/adobe/reader 10.0/reader/acrord32.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;07/14/09 01:39:20,N/A,C:/WINDOWS/system32/WindowsPowerShell/v1.0/powershell.exe,N/A,False,c:/windows/system32/windowspowershell/v1.0/powershell.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/20/10 13:24:58,N/A,C:/Windows/system32/msiexec.exe,N/A,True,c:/windows/system32/msiexec.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/20/10 12:17:22,N/A,C:/Windows/system32/msiexec.exe,N/A,False,c:/windows/system32/msiexec.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/20/10 12:17:22,N/A,C:/Windows/SysWOW64/msiexec.exe,N/A,True,c:/windows/syswow64/msiexec.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/20/10 13:25:13,N/A,C:/Windows/System32/sdclt.exe,N/A,True,c:/windows/system32/sdclt.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/20/10 13:25:12,N/A,C:/Windows/system32/schtasks.exe,N/A,True,c:/windows/system32/schtasks.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;05/19/11 20:05:00,N/A,C:/Program Files (x86)/McAfee/Common Framework/McScript_InUse.exe,N/A,True,c:/program files (x86)/mcafee/common framework/mcscript_inuse.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;06/20/10 02:06:46,N/A,C:/Program Files (x86)/Adobe/Reader 9.0/Reader/AcroRd32.exe,N/A,False,c:/program files (x86)/adobe/reader 9.0/reader/acrord32.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;07/14/09 01:39:16,N/A,C:/Windows/system32/magnify.exe,N/A,False,c:/windows/system32/magnify.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;09/09/11 15:34:56,N/A,C:/Program Files/Internet Explorer/iexplore.exe,N/A,True,c:/program files/internet explorer/iexplore.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;09/09/11 15:35:02,N/A,C:/Program Files (x86)/Internet Explorer/iexplore.exe,N/A,True,c:/program files (x86)/internet explorer/iexplore.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;07/14/09 01:39:31,N/A,C:/Windows/System32/rundll32.exe,N/A,True,c:/windows/system32/rundll32.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/20/10 13:25:00,N/A,C:/Windows/system32/mstsc.exe,N/A,False,c:/windows/system32/mstsc.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;07/14/09 01:39:06,N/A,C:/Windows/system32/displayswitch.exe,N/A,False,c:/windows/system32/displayswitch.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/20/10 13:24:33,N/A,C:/Windows/system32/cmd.exe,N/A,True,c:/windows/system32/cmd.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;07/14/09 01:39:37,N/A,C:/Windows/system32/services.exe,N/A,True,c:/windows/system32/services.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/08/09 03:49:06,N/A,C:/Program Files/VMware/VMware Tools/VMwareService.exe,N/A,True,c:/program files/vmware/vmware tools/vmwareservice.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/08/09 03:49:46,N/A,C:/Program Files/VMware/VMware Tools/VMUpgradeHelper.exe,N/A,True,c:/program files/vmware/vmware tools/vmupgradehelper.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/08/09 03:49:02,N/A,C:/Program Files/VMware/VMware Tools/VMwareTray.exe,N/A,True,c:/program files/vmware/vmware tools/vmwaretray.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/08/09 03:49:28,N/A,C:/Program Files/VMware/VMware Tools/VMwareUser.exe,N/A,True,c:/program files/vmware/vmware tools/vmwareuser.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;07/14/09 01:14:42,N/A,C:/Windows/system32/tasklist.exe,N/A,False,c:/windows/system32/tasklist.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;07/14/09 01:14:42,N/A,C:/Windows/SysWOW64/tasklist.exe,N/A,True,c:/windows/syswow64/tasklist.exe&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;07/14/09 01:38:52,N/A,C:/Windows/System32/wscui.cpl,N/A,False,c:/windows/system32/wscui.cpl&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;11/20/10 13:24:22,N/A,C:/Windows/System32/appwiz.cpl,N/A,False,c:/windows/system32/appwiz.cpl&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;{"Description": "sandboxed app permission store", "BusName": "org.freedesktop.impl.portal.PermissionStore", "ExecStart": "/usr/libexec/xdg-permission-store", "Type": "dbus"}&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;{"Description": "Portal service (GTK+/GNOME implementation)", "Type": "dbus", "BusName": "org.freedesktop.impl.portal.desktop.gtk", "ExecStart": "/usr/libexec/xdg-desktop-portal-gtk"}&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;{"Description": "Bluetooth OBEX service", "Type": "dbus", "BusName": "org.bluez.obex", "ExecStart": "/usr/lib/bluetooth/obexd", "Alias": "dbus-org.bluez.obex.service"}&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;{"Description": "GNOME Date &amp;amp; Time handling", "OnFailure": "gnome-session-failed.target", "CollectMode": "inactive-or-failed", "RefuseManualStart": "true", "RefuseManualStop": "true", "PartOf": "gsd-datetime.target", "After": "gnome-session-initialized.target", "Type": "dbus", "ExecStart": "/usr/libexec/gsd-datetime", "Restart": "on-failure", "BusName": "org.gnome.SettingsDaemon.Datetime", "TimeoutStopSec": "5"}&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;{"Description": "GNOME Maintenance of expirable data", "OnFailure": "gnome-session-failed.target", "CollectMode": "inactive-or-failed", "RefuseManualStart": "true", "RefuseManualStop": "true", "PartOf": "gsd-housekeeping.target", "After": "gnome-session-initialized.target", "Type": "dbus", "ExecStart": "/usr/libexec/gsd-housekeeping", "Restart": "on-failure", "BusName": "org.gnome.SettingsDaemon.Housekeeping", "TimeoutStopSec": "5"}&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;...&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;...&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;...&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, in this instance, for some reason the script is not outputting JSON...&lt;/P&gt;</description>
      <pubDate>Wed, 07 Jul 2021 12:47:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CLI-returns-quot-Action-forbidden-quot/m-p/558544#M12374</guid>
      <dc:creator>busyninja</dc:creator>
      <dc:date>2021-07-07T12:47:02Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CLI returns "Action forbidden"</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CLI-returns-quot-Action-forbidden-quot/m-p/558642#M12377</link>
      <description>&lt;P&gt;I can't get my head around why the results in a script would be different to the standard CLI when the commands are identical...&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jul 2021 06:14:42 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CLI-returns-quot-Action-forbidden-quot/m-p/558642#M12377</guid>
      <dc:creator>busyninja</dc:creator>
      <dc:date>2021-07-08T06:14:42Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CLI returns "Action forbidden"</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CLI-returns-quot-Action-forbidden-quot/m-p/558647#M12378</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/236104"&gt;@busyninja&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you please try to store OP in file and see it has also same problem or not?&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;/opt/splunk/bin/splunk search '| makeresults count=200 | eval a=1| accum a' -auth admin:admin123 -app 'search' -preview true -maxout 0 -header false &amp;gt; data1.txt&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Script&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;import os
output = os.popen(
    '/opt/splunk/bin/splunk search "| makeresults count=200 | eval a=1| accum a" -auth admin:admin123 -app "search" -maxout 0 -max_time 0 -header false -preview true &amp;gt; data2.txt').read()
print(output)&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;KV&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jul 2021 07:15:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CLI-returns-quot-Action-forbidden-quot/m-p/558647#M12378</guid>
      <dc:creator>kamlesh_vaghela</dc:creator>
      <dc:date>2021-07-08T07:15:48Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CLI returns "Action forbidden"</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CLI-returns-quot-Action-forbidden-quot/m-p/558657#M12379</link>
      <description>&lt;P&gt;I have managed to solve the issue. The problem was that I was not waiting long enough for the data to be indexed between starting the server and running the commands in the script - they was nothing in-between. Of course, when I then ran the same command at the CLI directly, enough time had passed for the remaining data to populate the search results. I have also decided to utilise the REST API instead of using the Splunk CLI.&lt;/P&gt;&lt;P&gt;This is the excerpt of my script now:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;subprocess.Popen(["/"+postpath+"splunk/bin/./splunk", "start"], stdout=subprocess.PIPE, stderr=subprocess.PIPE).communicate()
time.sleep(30)
apiout = subprocess.Popen(["curl", "-u", "admin:password", "-k", "https://localhost:8089/services/search/jobs", "-d", "search=search index=* host=* mitre_technique!=- | stats count BY mitre_technique | fields - count"], stdout=subprocess.PIPE, stderr=subprocess.PIPE).communicate()
jobid = re.findall(r"&amp;lt;sid&amp;gt;(?P&amp;lt;sid&amp;gt;[^&amp;lt;]+)&amp;lt;/sid&amp;gt;", str(apiout[0]))
time.sleep(30)
searchout = subprocess.Popen(["curl", "-u", "admin:password", "-k", "https://localhost:8089/services/search/jobs/"+jobid[0]+"/results/", "--get"], stdout=subprocess.PIPE, stderr=subprocess.PIPE).communicate()
print(searchout)&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This combination of using the REST API and a time.sleep(#) has solved the issue but thank you so much for your help and contribution.&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jul 2021 10:06:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CLI-returns-quot-Action-forbidden-quot/m-p/558657#M12379</guid>
      <dc:creator>busyninja</dc:creator>
      <dc:date>2021-07-08T10:06:19Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk CLI returns "Action forbidden"</title>
      <link>https://community.splunk.com/t5/Security/Splunk-CLI-returns-quot-Action-forbidden-quot/m-p/558684#M12380</link>
      <description>&lt;P&gt;Cool. &amp;nbsp;Glad to help you&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/236104"&gt;@busyninja&lt;/a&gt;&amp;nbsp;. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Please accept the answer to help community and If any of my reply helps you to solve the problem Or gain knowledge, an upvote would be appreciated.&lt;/P&gt;&lt;P&gt;KV&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Jul 2021 13:14:18 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Security/Splunk-CLI-returns-quot-Action-forbidden-quot/m-p/558684#M12380</guid>
      <dc:creator>kamlesh_vaghela</dc:creator>
      <dc:date>2021-07-08T13:14:18Z</dc:date>
    </item>
  </channel>
</rss>

