<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Splunk Add-on for Microsoft Cloud Services: How to index Azure Active Directory &amp;quot;Sign-Ins&amp;quot; data? in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Cloud-Services-How-to-index-Azure/m-p/259574#M29902</link>
    <description>&lt;P&gt;do it via API: &lt;A href="https://docs.microsoft.com/en-us/azure/active-directory/active-directory-reporting-guide"&gt;https://docs.microsoft.com/en-us/azure/active-directory/active-directory-reporting-guide&lt;/A&gt; all signin data should be pulled&lt;/P&gt;</description>
    <pubDate>Fri, 10 Feb 2017 21:48:02 GMT</pubDate>
    <dc:creator>dstefan</dc:creator>
    <dc:date>2017-02-10T21:48:02Z</dc:date>
    <item>
      <title>Splunk Add-on for Microsoft Cloud Services: How to index Azure Active Directory "Sign-Ins" data?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Cloud-Services-How-to-index-Azure/m-p/259567#M29895</link>
      <description>&lt;P&gt;Hi -&lt;/P&gt;

&lt;P&gt;We have the Splunk Add-on for Microsoft Cloud Services installed and are currently collecting Azure "Activity  Logs" into Splunk.&lt;/P&gt;

&lt;P&gt;However, we'd also like to capture the Azure (portal.azure.com) -&amp;gt; Azure Active Directory -&amp;gt; "Sign-Ins" data into Splunk.  &lt;/P&gt;

&lt;P&gt;Can anyone advise as how to achieve this?&lt;/P&gt;

&lt;P&gt;Many thanks,&lt;BR /&gt;
Tom&lt;/P&gt;</description>
      <pubDate>Thu, 01 Dec 2016 14:15:09 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Cloud-Services-How-to-index-Azure/m-p/259567#M29895</guid>
      <dc:creator>djukicm</dc:creator>
      <dc:date>2016-12-01T14:15:09Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Microsoft Cloud Services: How to index Azure Active Directory "Sign-Ins" data?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Cloud-Services-How-to-index-Azure/m-p/259568#M29896</link>
      <description>&lt;P&gt;All authentication can be ingested using the O365 Management Activity input. You just need to select the Azure Authentication from that input. This is technically ingesting all Azure authentication beyong O365 apps. &lt;BR /&gt;
You can use the Azure audit input for Azure portal audit related. &lt;/P&gt;</description>
      <pubDate>Thu, 01 Dec 2016 17:59:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Cloud-Services-How-to-index-Azure/m-p/259568#M29896</guid>
      <dc:creator>ehaddad_splunk</dc:creator>
      <dc:date>2016-12-01T17:59:25Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Microsoft Cloud Services: How to index Azure Active Directory "Sign-Ins" data?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Cloud-Services-How-to-index-Azure/m-p/259569#M29897</link>
      <description>&lt;P&gt;I am using this add-on and was able to get logs from table and blob storage to Splunk.&lt;BR /&gt;
But even after configuring the AD application details and audit input, Activity logs are not getting indexed in Splunk.&lt;BR /&gt;
I have the requirement of Active directory Audit and Sign in logs to be indexed. Can you please help me on this?&lt;BR /&gt;
1) Indexing Azure activity logs&lt;BR /&gt;
2) Indexing Azure AD audit and Sign in logs.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Dec 2016 22:06:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Cloud-Services-How-to-index-Azure/m-p/259569#M29897</guid>
      <dc:creator>arunkabrahamdnb</dc:creator>
      <dc:date>2016-12-14T22:06:48Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Microsoft Cloud Services: How to index Azure Active Directory "Sign-Ins" data?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Cloud-Services-How-to-index-Azure/m-p/259570#M29898</link>
      <description>&lt;P&gt;I am using this add-on and was able to get logs from table and blob storage to Splunk.&lt;BR /&gt;
But even after configuring the AD application details and audit input, Activity logs are not getting indexed in Splunk.&lt;BR /&gt;
I have the requirement of Active directory Audit and Sign in logs to be indexed. Can you please help me on this?&lt;BR /&gt;
1) Indexing Azure activity logs&lt;BR /&gt;
2) Indexing Azure AD audit and Sign in logs.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Dec 2016 22:07:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Cloud-Services-How-to-index-Azure/m-p/259570#M29898</guid>
      <dc:creator>arunkabrahamdnb</dc:creator>
      <dc:date>2016-12-14T22:07:02Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Microsoft Cloud Services: How to index Azure Active Directory "Sign-Ins" data?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Cloud-Services-How-to-index-Azure/m-p/259571#M29899</link>
      <description>&lt;P&gt;What errors are you getting in index=_internal? &lt;BR /&gt;
I would suggest to file a support ticket and upload diag on that ticket for us to get a closer look. Hard to tell what the problem is without the log files.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Dec 2016 23:44:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Cloud-Services-How-to-index-Azure/m-p/259571#M29899</guid>
      <dc:creator>ehaddad_splunk</dc:creator>
      <dc:date>2016-12-14T23:44:02Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Microsoft Cloud Services: How to index Azure Active Directory "Sign-Ins" data?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Cloud-Services-How-to-index-Azure/m-p/259572#M29900</link>
      <description>&lt;P&gt;Copied the logs  for a short period. Can this help?&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;12/15/16
3:31:54.878 PM  
12-15-2016 15:31:54.878 +0000 WARN  FieldAliaser - Invalid field alias specification in stanza 'ri:pas:application': FIELDALIAS-event_id='event_id AS event_id'
host =  prd-p-59vhkzlq9h5s source = /opt/splunk/var/log/splunk/splunkd.log sourcetype = splunkd
12/15/16
3:31:19.941 PM  
12-15-2016 15:31:19.941 +0000 WARN  SearchOperator:kv - IndexOutOfBounds invalid The FORMAT capturing group id: id=3, transform_name='error_info'
host =  prd-p-59vhkzlq9h5s source = /opt/splunk/var/log/splunk/splunkd.log sourcetype = splunkd
12/15/16
3:31:19.888 PM  
12-15-2016 15:31:19.888 +0000 WARN  SearchOperator:kv - Invalid key-value parser, ignoring it, transform_name='mscs_counter_name'
host =  prd-p-59vhkzlq9h5s source = /opt/splunk/var/log/splunk/splunkd.log sourcetype = splunkd
12/15/16
3:31:19.833 PM  
12-15-2016 15:31:19.833 +0000 WARN  FieldAliaser - Invalid field alias specification in stanza 'ri:pas:application': FIELDALIAS-event_id='event_id AS event_id'
host =  prd-p-59vhkzlq9h5s source = /opt/splunk/var/log/splunk/splunkd.log sourcetype = splunkd
12/15/16
3:31:02.341 PM  
12-15-2016 15:31:02.341 +0000 WARN  SearchOperator:kv - IndexOutOfBounds invalid The FORMAT capturing group id: id=3, transform_name='error_info'
host =  prd-p-59vhkzlq9h5s source = /opt/splunk/var/log/splunk/splunkd.log sourcetype = splunkd
12/15/16
3:31:02.227 PM  
12-15-2016 15:31:02.227 +0000 WARN  SearchOperator:kv - Invalid key-value parser, ignoring it, transform_name='mscs_counter_name'
host =  prd-p-59vhkzlq9h5s source = /opt/splunk/var/log/splunk/splunkd.log sourcetype = splunkd
12/15/16
3:31:02.103 PM  
12-15-2016 15:31:02.103 +0000 WARN  FieldAliaser - Invalid field alias specification in stanza 'ri:pas:application': FIELDALIAS-event_id='event_id AS event_id'
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Thu, 15 Dec 2016 15:35:58 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Cloud-Services-How-to-index-Azure/m-p/259572#M29900</guid>
      <dc:creator>arunkabrahamdnb</dc:creator>
      <dc:date>2016-12-15T15:35:58Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Microsoft Cloud Services: How to index Azure Active Directory "Sign-Ins" data?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Cloud-Services-How-to-index-Azure/m-p/259573#M29901</link>
      <description>&lt;P&gt;Thanks ehaddad - when I attempt to link our Office365 account I get the following error when signing in:&lt;/P&gt;

&lt;P&gt;"Sorry, but we're having trouble signing you in.  We received a bad request"&lt;/P&gt;

&lt;P&gt;and&lt;/P&gt;

&lt;P&gt;"Resource '&lt;A href="https://manage.office.com"&gt;https://manage.office.com&lt;/A&gt;' is disabled" &lt;/P&gt;

&lt;P&gt;Any further ideas on this?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Dec 2016 17:07:16 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Cloud-Services-How-to-index-Azure/m-p/259573#M29901</guid>
      <dc:creator>djukicm</dc:creator>
      <dc:date>2016-12-16T17:07:16Z</dc:date>
    </item>
    <item>
      <title>Re: Splunk Add-on for Microsoft Cloud Services: How to index Azure Active Directory "Sign-Ins" data?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Cloud-Services-How-to-index-Azure/m-p/259574#M29902</link>
      <description>&lt;P&gt;do it via API: &lt;A href="https://docs.microsoft.com/en-us/azure/active-directory/active-directory-reporting-guide"&gt;https://docs.microsoft.com/en-us/azure/active-directory/active-directory-reporting-guide&lt;/A&gt; all signin data should be pulled&lt;/P&gt;</description>
      <pubDate>Fri, 10 Feb 2017 21:48:02 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Splunk-Add-on-for-Microsoft-Cloud-Services-How-to-index-Azure/m-p/259574#M29902</guid>
      <dc:creator>dstefan</dc:creator>
      <dc:date>2017-02-10T21:48:02Z</dc:date>
    </item>
  </channel>
</rss>

