<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Ingesting logs from Microsoft Teams in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/506702#M62268</link>
    <description>&lt;P&gt;Hey All,&lt;/P&gt;&lt;P&gt;I recently installed/configured the Microsoft Teams Add-on in an attempt to ingest call logs and meeting info from Microsoft Teams.&amp;nbsp;&amp;nbsp; I have run into an issue I was hoping someone could help with or shed some light on.&lt;/P&gt;&lt;P&gt;Add-On Version: 1.02&lt;/P&gt;&lt;P&gt;Splunk Version: 7.3.4&lt;/P&gt;&lt;P&gt;App is installed on a HF.&lt;/P&gt;&lt;P&gt;I have followed the instructions on the setup and have the Subscription, User Reports, Call Reports and Webhook all setup in the inputs section of the app. It appears though the only thing working is the User Reports. I have granted all of the required permissions in Teams\Azure&amp;nbsp; per the documentation.&lt;/P&gt;&lt;P&gt;The _internal logs don't give a whole lot of information indicating what the issue might be even with DEBUG logging enabled for the app.&lt;/P&gt;&lt;P&gt;The only thing I am seeing in the logs indicating an issue was this:&lt;/P&gt;&lt;P&gt;&lt;SPAN class="t"&gt;127.0.0.1&lt;/SPAN&gt; &lt;SPAN class="t"&gt;-&lt;/SPAN&gt; &lt;SPAN class="t"&gt;splunk-system-user&lt;/SPAN&gt; [&lt;SPAN class="t"&gt;30/Jun/2020:09:05:36.213&lt;/SPAN&gt; &lt;SPAN class="t"&gt;-0500&lt;/SPAN&gt;] "&lt;SPAN class="t"&gt;GET&lt;/SPAN&gt; &lt;SPAN class="t"&gt;/servicesNS/nobody/TA_MS_&lt;SPAN class="t a"&gt;Teams&lt;/SPAN&gt;/properties/TA_MS_&lt;SPAN class="t a"&gt;Teams&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="t"&gt;HTTP/1.1&lt;/SPAN&gt;" &lt;SPAN class="t"&gt;404&lt;/SPAN&gt; &lt;SPAN class="t"&gt;144&lt;/SPAN&gt; &lt;SPAN class="t"&gt;-&lt;/SPAN&gt; &lt;SPAN class="t"&gt;-&lt;/SPAN&gt; &lt;SPAN class="t"&gt;-&lt;/SPAN&gt; &lt;SPAN class="t"&gt;0ms&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;And this:&lt;/P&gt;&lt;P&gt;2020-06-30 09:25:43,189 ERROR pid=107176 tid=MainThread file=base_modinput.py:log_error:309 | Could not create subscription: 400 Client Error: Bad Request for url: &lt;A href="https://graph.microsoft.com/beta/subscriptions" target="_blank"&gt;https://graph.microsoft.com/beta/subscriptions&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The&amp;nbsp; documentation also mentions a webook which I am a little confused as to where that webhook resides. Is it in Teams itself or where the app is installed? It seems like the webook is in the app on the HF based on how the documentation reads?&lt;/P&gt;&lt;P&gt;Any help would be greatly appreciated.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Andrew&lt;/P&gt;</description>
    <pubDate>Tue, 30 Jun 2020 15:07:52 GMT</pubDate>
    <dc:creator>adalbor</dc:creator>
    <dc:date>2020-06-30T15:07:52Z</dc:date>
    <item>
      <title>Ingesting logs from Microsoft Teams</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/506702#M62268</link>
      <description>&lt;P&gt;Hey All,&lt;/P&gt;&lt;P&gt;I recently installed/configured the Microsoft Teams Add-on in an attempt to ingest call logs and meeting info from Microsoft Teams.&amp;nbsp;&amp;nbsp; I have run into an issue I was hoping someone could help with or shed some light on.&lt;/P&gt;&lt;P&gt;Add-On Version: 1.02&lt;/P&gt;&lt;P&gt;Splunk Version: 7.3.4&lt;/P&gt;&lt;P&gt;App is installed on a HF.&lt;/P&gt;&lt;P&gt;I have followed the instructions on the setup and have the Subscription, User Reports, Call Reports and Webhook all setup in the inputs section of the app. It appears though the only thing working is the User Reports. I have granted all of the required permissions in Teams\Azure&amp;nbsp; per the documentation.&lt;/P&gt;&lt;P&gt;The _internal logs don't give a whole lot of information indicating what the issue might be even with DEBUG logging enabled for the app.&lt;/P&gt;&lt;P&gt;The only thing I am seeing in the logs indicating an issue was this:&lt;/P&gt;&lt;P&gt;&lt;SPAN class="t"&gt;127.0.0.1&lt;/SPAN&gt; &lt;SPAN class="t"&gt;-&lt;/SPAN&gt; &lt;SPAN class="t"&gt;splunk-system-user&lt;/SPAN&gt; [&lt;SPAN class="t"&gt;30/Jun/2020:09:05:36.213&lt;/SPAN&gt; &lt;SPAN class="t"&gt;-0500&lt;/SPAN&gt;] "&lt;SPAN class="t"&gt;GET&lt;/SPAN&gt; &lt;SPAN class="t"&gt;/servicesNS/nobody/TA_MS_&lt;SPAN class="t a"&gt;Teams&lt;/SPAN&gt;/properties/TA_MS_&lt;SPAN class="t a"&gt;Teams&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="t"&gt;HTTP/1.1&lt;/SPAN&gt;" &lt;SPAN class="t"&gt;404&lt;/SPAN&gt; &lt;SPAN class="t"&gt;144&lt;/SPAN&gt; &lt;SPAN class="t"&gt;-&lt;/SPAN&gt; &lt;SPAN class="t"&gt;-&lt;/SPAN&gt; &lt;SPAN class="t"&gt;-&lt;/SPAN&gt; &lt;SPAN class="t"&gt;0ms&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;And this:&lt;/P&gt;&lt;P&gt;2020-06-30 09:25:43,189 ERROR pid=107176 tid=MainThread file=base_modinput.py:log_error:309 | Could not create subscription: 400 Client Error: Bad Request for url: &lt;A href="https://graph.microsoft.com/beta/subscriptions" target="_blank"&gt;https://graph.microsoft.com/beta/subscriptions&lt;/A&gt;&lt;/P&gt;&lt;P&gt;The&amp;nbsp; documentation also mentions a webook which I am a little confused as to where that webhook resides. Is it in Teams itself or where the app is installed? It seems like the webook is in the app on the HF based on how the documentation reads?&lt;/P&gt;&lt;P&gt;Any help would be greatly appreciated.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Andrew&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jun 2020 15:07:52 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/506702#M62268</guid>
      <dc:creator>adalbor</dc:creator>
      <dc:date>2020-06-30T15:07:52Z</dc:date>
    </item>
    <item>
      <title>Re: Ingesting logs from Microsoft Teams</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/506860#M62281</link>
      <description>&lt;P&gt;Having literally just gone through this, I'll try to help!&amp;nbsp; What was broken for me (and giving the same headache) sounds like exactly what you're seeing.&lt;/P&gt;&lt;P&gt;If you're getting user reports then your app is correct and the permissions are correct.&amp;nbsp; What is broken is your either your subscription, webhook, or CDR.&amp;nbsp; For me, it was the webhook/subscription because they both are interconnected.&lt;/P&gt;&lt;P&gt;First, the Webhook.&amp;nbsp; The webook has to live on the HF where the Add-on is installed.&amp;nbsp; The port you give it must be accessible from the public internet (because that's how teams works) and MUST be SSL.&amp;nbsp; Otherwise nothing will work.&amp;nbsp; Easiest way to test is to go to the public IP address (from something on the internet) and test &lt;A target="_blank" rel="noopener"&gt;https://&amp;lt;webhookName&amp;gt;:&amp;lt;portdefined&amp;gt;&lt;/A&gt;&amp;nbsp;and you should get:&lt;/P&gt;&lt;PRE&gt;{"success": true}&lt;/PRE&gt;&lt;P&gt;My config looks like this:&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-left" image-alt="2020-07-01_06-54-28.png" style="width: 400px;"&gt;&lt;img src="https://community.splunk.com/t5/image/serverpage/image-id/9415iD52758AD4BD46B5C/image-size/medium?v=v2&amp;amp;px=400" role="button" title="2020-07-01_06-54-28.png" alt="2020-07-01_06-54-28.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I got my webhook URL (via https, hostname, port) I get a success.&lt;/P&gt;&lt;P&gt;Once that's done, you configure the Subscription to reference the correct webhook URL.&lt;/P&gt;&lt;P&gt;After that, data should start flowing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this helps, hit me up if you need more help with it!&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jul 2020 11:58:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/506860#M62281</guid>
      <dc:creator>jasonabbott</dc:creator>
      <dc:date>2020-07-01T11:58:41Z</dc:date>
    </item>
    <item>
      <title>Re: Ingesting logs from Microsoft Teams</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/506874#M62284</link>
      <description>&lt;P&gt;Thanks for the super helpful information! Definitely puts me on the right path and kinda confirmed my suspicions.&lt;/P&gt;&lt;P&gt;So you used a cert from an external party and NAT'ed that hostname at your FW?&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jul 2020 13:09:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/506874#M62284</guid>
      <dc:creator>adalbor</dc:creator>
      <dc:date>2020-07-01T13:09:57Z</dc:date>
    </item>
    <item>
      <title>Re: Ingesting logs from Microsoft Teams</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/506883#M62286</link>
      <description>&lt;P&gt;Exactly!&amp;nbsp; Once I did that I have data not only in the Remote Work Insights app, but also in the M365 Teams section.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jul 2020 14:25:06 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/506883#M62286</guid>
      <dc:creator>jasonabbott</dc:creator>
      <dc:date>2020-07-01T14:25:06Z</dc:date>
    </item>
    <item>
      <title>Re: Ingesting logs from Microsoft Teams</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/506884#M62287</link>
      <description>&lt;P&gt;Great! Thanks for the helpful info!&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jul 2020 14:34:19 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/506884#M62287</guid>
      <dc:creator>adalbor</dc:creator>
      <dc:date>2020-07-01T14:34:19Z</dc:date>
    </item>
    <item>
      <title>Re: Ingesting logs from Microsoft Teams</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/511772#M62720</link>
      <description>&lt;P&gt;Is your webhook accessible to any public traffic, or were you able to whitelist incoming traffic from Microsoft? I really don't want my Heavy Forwarder exposed to the internet.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2020 14:38:43 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/511772#M62720</guid>
      <dc:creator>nakiamatthews</dc:creator>
      <dc:date>2020-07-30T14:38:43Z</dc:date>
    </item>
    <item>
      <title>Re: Ingesting logs from Microsoft Teams</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/511780#M62722</link>
      <description>&lt;P&gt;I honestly still can't get it to work but can relay our current setup if it helps.&lt;/P&gt;&lt;P&gt;We created an external cert with a specific URL that the webhook would use.&lt;/P&gt;&lt;P&gt;We then ensured the webhook setup in the Splunk app had that URL.&lt;/P&gt;&lt;P&gt;HTTPS inbound to our URL is translated to our specified port at the firewall. If that traffic matches the security policy, it is forwarded on to the F5. The F5 is listening on that port and will pass traffic to the Splunk server on that same port. We do have the Graph API IPs allowed as part of that security policy on the FW.&lt;/P&gt;&lt;P&gt;We can hit the webhook internally via our F5 but still can't get it to work pulling Teams logs.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2020 15:36:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/511780#M62722</guid>
      <dc:creator>adalbor</dc:creator>
      <dc:date>2020-07-30T15:36:37Z</dc:date>
    </item>
    <item>
      <title>Re: Ingesting logs from Microsoft Teams</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/511790#M62724</link>
      <description>&lt;P&gt;So, a quick couple of things:&lt;/P&gt;&lt;P&gt;1) Your webhook needs to talk HTTPS, it doesn't need to be on 443.&amp;nbsp; My test, for instance, is on port 4443.&lt;/P&gt;&lt;P&gt;2) My webhook has allow from all for the moment, but I am working on tightening it down to microsoft's network ranges (see this page: &lt;A href="https://docs.microsoft.com/en-us/office365/enterprise/urls-and-ip-address-ranges" target="_blank" rel="noopener"&gt;https://docs.microsoft.com/en-us/office365/enterprise/urls-and-ip-address-ranges&lt;/A&gt;).&amp;nbsp;&lt;/P&gt;&lt;P&gt;If it stops working when I change my ACL, I will post here.&lt;/P&gt;&lt;P&gt;**EDIT**&lt;/P&gt;&lt;P&gt;I updated my ACL to only use the ranges listed in the post above (13.107.6.152/31, 13.107.18.10/31, 13.107.128.0/22, 23.103.160.0/20, 40.96.0.0/13, 40.104.0.0/15, 52.96.0.0/14, 131.253.33.215/32, 132.245.0.0/16, 150.171.32.0/22, 191.234.140.0/22, 204.79.197.215/32) and my CDR's are still flowing correctly.&amp;nbsp; I will check tomorrow to make sure my user details are still flowing correctly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;**EDIT #2**&lt;/P&gt;&lt;P&gt;Verified this morning that all my user data is flowing correctly into the TA.&lt;/P&gt;</description>
      <pubDate>Fri, 31 Jul 2020 13:21:26 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/511790#M62724</guid>
      <dc:creator>jasonabbott</dc:creator>
      <dc:date>2020-07-31T13:21:26Z</dc:date>
    </item>
    <item>
      <title>Re: Ingesting logs from Microsoft Teams</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/511791#M62725</link>
      <description>&lt;P&gt;Yeah my webhook is using 4444.&lt;/P&gt;&lt;P&gt;Glad to hear its still working with good ACL's in place.&lt;/P&gt;&lt;P&gt;Do you have the cert only on your HF and only a FW in between?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2020 16:11:44 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/511791#M62725</guid>
      <dc:creator>adalbor</dc:creator>
      <dc:date>2020-07-30T16:11:44Z</dc:date>
    </item>
    <item>
      <title>Re: Ingesting logs from Microsoft Teams</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/511793#M62726</link>
      <description>&lt;P&gt;That's correct, my cert is on the HF only.&amp;nbsp; The firewall between the two is a fairly "stupid" setup in that it only allows port/protocol and doesn't do traffic inspection.&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jul 2020 16:20:25 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/511793#M62726</guid>
      <dc:creator>jasonabbott</dc:creator>
      <dc:date>2020-07-30T16:20:25Z</dc:date>
    </item>
    <item>
      <title>Re: Ingesting logs from Microsoft Teams</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/512146#M62767</link>
      <description>&lt;P&gt;Hello Jason ,&lt;/P&gt;&lt;P&gt;I really appreciate you to give me a response. I have a confusion at here.&lt;/P&gt;&lt;P&gt;1- In Step 1 - Addon mentioned to add webhook name. I give unique name of input in webhook, like Teamswebhook and rest of the field will as is .&lt;/P&gt;&lt;P&gt;2- In Step2 - In teams subscription they ask me to provide the webhook url .Here I am getting confuse -&lt;/P&gt;&lt;P&gt;Either I will provide https://Teamswebhook(That I have add on step1):4444&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;OR&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://serverhostname%28where/" target="_blank" rel="nofollow noopener noreferrer"&gt;https://ServerHostname(Where&lt;/A&gt;&amp;nbsp;Add-ON is running):4444 .&lt;/P&gt;&lt;P&gt;Could you please help me to know , how I will provide the WebHook url at here.&lt;/P&gt;&lt;P&gt;I will wait for your response.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Atul Jha&lt;/P&gt;</description>
      <pubDate>Mon, 03 Aug 2020 13:27:23 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/512146#M62767</guid>
      <dc:creator>atuljha82</dc:creator>
      <dc:date>2020-08-03T13:27:23Z</dc:date>
    </item>
    <item>
      <title>Re: Ingesting logs from Microsoft Teams</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/512150#M62768</link>
      <description>&lt;P&gt;I see the confusion!&amp;nbsp; The "Name" of the webhook is just for internal use.&amp;nbsp; The name you use for the "Webhook URL" in the Teams Subscription is &lt;A href="https://&amp;lt;your" target="_blank"&gt;https://&amp;lt;serverwhereaddonisrunning&amp;gt;:&amp;lt;port&amp;gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Make sure, as I said, that &lt;A href="https://community.splunk.com/" target="_blank"&gt;https://&amp;lt;serverwhereaddonisrunning&amp;gt;:&amp;lt;port&amp;gt;&lt;/A&gt; is available from the MSFT internet ranges!&lt;/P&gt;</description>
      <pubDate>Mon, 03 Aug 2020 13:34:05 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/512150#M62768</guid>
      <dc:creator>jasonabbott</dc:creator>
      <dc:date>2020-08-03T13:34:05Z</dc:date>
    </item>
    <item>
      <title>Re: Ingesting logs from Microsoft Teams</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/513022#M62865</link>
      <description>&lt;P&gt;How did you generate your webhook URL? I'm having trouble understanding the format you provided - &lt;A target="_blank" rel="noopener"&gt;https://&amp;lt;webhookName&amp;gt;:&amp;lt;portdefined&amp;gt;&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;&lt;P&gt;My webhook name is "teams_webhook" and the port i chose was 443. Using your provided format, the webhook looks like&amp;nbsp;&lt;A href="https://teams_webhook:443" target="_blank"&gt;https://teams_webhook:443&lt;/A&gt;&amp;nbsp;but this isn't a valid URL.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also tried &lt;A href="https://&amp;lt;public" target="_blank"&gt;https://&amp;lt;publicip&amp;gt;:443/teams_webhook&amp;nbsp;&lt;/A&gt;but this also fails.&lt;/P&gt;&lt;P&gt;Later in your post you describe getting a webhook via https, hostname, port; but this also would only work if your hostname is publicly accessible. Any sugggestions?&lt;/P&gt;</description>
      <pubDate>Fri, 07 Aug 2020 15:00:34 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/513022#M62865</guid>
      <dc:creator>dtrelford</dc:creator>
      <dc:date>2020-08-07T15:00:34Z</dc:date>
    </item>
    <item>
      <title>Re: Ingesting logs from Microsoft Teams</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/513024#M62866</link>
      <description>&lt;P&gt;Ignore my last post! I see now that you already answered this in a previous comment.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Aug 2020 15:04:08 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/513024#M62866</guid>
      <dc:creator>dtrelford</dc:creator>
      <dc:date>2020-08-07T15:04:08Z</dc:date>
    </item>
    <item>
      <title>Re: Ingesting logs from Microsoft Teams</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/524260#M63822</link>
      <description>&lt;P&gt;Hello Jason ,&lt;/P&gt;&lt;P&gt;We are implementing the Microsoft Teams Add-On but here is some confusion if you can help me then it will be great. My heavy forwarder is not running over an internet it is running via http. So I got a ssl certificate from Network Team to install for Microsoft Teams implementation. So below steps I have been taken -&lt;/P&gt;&lt;P&gt;1- I have copied ssl certificate .pem file on to splunk directory-Program Files\Splunk\etc\auth\&lt;/P&gt;&lt;P&gt;2- The above path I have given into Teams Webhook Configuration.&lt;/P&gt;&lt;P&gt;3- In Teams webhook configuration it is also asking the .key file .So here two things-&lt;/P&gt;&lt;P&gt;1- Are you referring Splunk Web key file - to generate new key file&lt;/P&gt;&lt;P&gt;or&amp;nbsp;&lt;/P&gt;&lt;P&gt;2- I will extract .key file from SSL certificate which I have received from Network Team.&lt;/P&gt;&lt;P&gt;Quick response is highly appreciable.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Atul&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Oct 2020 17:30:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/524260#M63822</guid>
      <dc:creator>atuljha82</dc:creator>
      <dc:date>2020-10-12T17:30:32Z</dc:date>
    </item>
    <item>
      <title>Re: Ingesting logs from Microsoft Teams</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/531395#M64314</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;Can some-one help me on this for Teams Add-On where Teams plugin have been installed on to Heavy Forwarder and we are getting the user report but we are not getting Call Record data from Teams to Splunk.&lt;/P&gt;&lt;P&gt;While webhook&amp;nbsp; is live on port 4444 and configure over an Loadbalancer and have allowed the Microsoft Network Ranges in ACL and have verified as well. But still didn't get any data for Call Record.&lt;/P&gt;&lt;P&gt;Quick response is highly appreciable.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Atul Jha&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 30 Nov 2020 19:58:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/531395#M64314</guid>
      <dc:creator>atuljha82</dc:creator>
      <dc:date>2020-11-30T19:58:04Z</dc:date>
    </item>
    <item>
      <title>Re: Ingesting logs from Microsoft Teams</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/531597#M64337</link>
      <description>&lt;P&gt;Hello Jason,&lt;/P&gt;&lt;P&gt;Please do help me at here -&lt;/P&gt;&lt;P&gt;I am facing the issue on subscription log -&lt;/P&gt;&lt;P&gt;2020-12-01 13:17:01,552 DEBUG pid=2932 tid=MainThread file=connectionpool.py:_make_request:437 | &lt;A href="https://127.0.0.1:8089" target="_blank"&gt;https://127.0.0.1:8089&lt;/A&gt; "GET /servicesNS/nobody/TA_MS_Teams/storage/collections/config/?offset=0&amp;amp;search=TA_MS_Teams_checkpointer&amp;amp;count=-1 HTTP/1.1" 200 4535&lt;BR /&gt;2020-12-01 13:17:01,553 DEBUG pid=2932 tid=MainThread file=binding.py:new_f:73 | Operation took 0:00:00.003000&lt;BR /&gt;2020-12-01 13:17:01,558 DEBUG pid=2932 tid=MainThread file=binding.py:get:677 | GET request to &lt;A href="https://127.0.0.1:8089/servicesNS/nobody/TA_MS_Teams/storage/collections/data/TA_MS_Teams_checkpointer/m365_subscription_MS_teams_subscription" target="_blank"&gt;https://127.0.0.1:8089/servicesNS/nobody/TA_MS_Teams/storage/collections/data/TA_MS_Teams_checkpointer/m365_subscription_MS_teams_subscription&lt;/A&gt; (body: {})&lt;BR /&gt;2020-12-01 13:17:01,561 DEBUG pid=2932 tid=MainThread file=connectionpool.py:_make_request:437 | &lt;A href="https://127.0.0.1:8089" target="_blank"&gt;https://127.0.0.1:8089&lt;/A&gt; "GET /servicesNS/nobody/TA_MS_Teams/storage/collections/data/TA_MS_Teams_checkpointer/m365_subscription_MS_teams_subscription HTTP/1.1" 404 140&lt;BR /&gt;2020-12-01 13:17:01,562 DEBUG pid=2932 tid=MainThread file=base_modinput.py:log_debug:288 | _Splunk_ Getting proxy server.&lt;BR /&gt;2020-12-01 13:17:01,562 INFO pid=2932 tid=MainThread file=setup_util.py:log_info:117 | Proxy is not enabled!&lt;BR /&gt;2020-12-01 13:17:01,562 DEBUG pid=2932 tid=MainThread file=connectionpool.py:_new_conn:959 | Starting new HTTPS connection (1): graph.microsoft.com:443&lt;BR /&gt;2020-12-01 13:17:11,724 DEBUG pid=2932 tid=MainThread file=connectionpool.py:_make_request:437 | &lt;A href="https://graph.microsoft.com:443" target="_blank"&gt;https://graph.microsoft.com:443&lt;/A&gt; "POST /beta/subscriptions HTTP/1.1" 400 310&lt;BR /&gt;2020-12-01 13:17:11,726 ERROR pid=2932 tid=MainThread file=base_modinput.py:log_error:309 | Could not create subscription: 400 Client Error: Bad Request for url: &lt;A href="https://graph.microsoft.com/beta/subscriptions" target="_blank"&gt;https://graph.microsoft.com/beta/subscriptions&lt;/A&gt;&lt;BR /&gt;2020-12-01 13:17:11,729 ERROR pid=2932 tid=MainThread file=base_modinput.py:log_error:309 | Get error when collecting events.&lt;BR /&gt;Traceback (most recent call last):&lt;BR /&gt;File "D:\Program Files\Splunk\etc\apps\TA_MS_Teams\bin\ta_ms_teams\aob_py2\modinput_wrapper\base_modinput.py", line 128, in stream_events&lt;BR /&gt;self.collect_events(ew)&lt;BR /&gt;File "D:\Program Files\Splunk\etc\apps\TA_MS_Teams\bin\teams_subscription.py", line 76, in collect_events&lt;BR /&gt;input_module.collect_events(self, ew)&lt;BR /&gt;File "D:\Program Files\Splunk\etc\apps\TA_MS_Teams\bin\input_module_teams_subscription.py", line 113, in collect_events&lt;BR /&gt;raise e&lt;BR /&gt;HTTPError: 400 Client Error: Bad Request for url: &lt;A href="https://graph.microsoft.com/beta/subscriptions" target="_blank"&gt;https://graph.microsoft.com/beta/subscriptions&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Dec 2020 20:58:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/531597#M64337</guid>
      <dc:creator>atuljha82</dc:creator>
      <dc:date>2020-12-01T20:58:47Z</dc:date>
    </item>
    <item>
      <title>Re: Ingesting logs from Microsoft Teams</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/533212#M64440</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/224491"&gt;@atuljha82&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I had and identical error message in my logs.&amp;nbsp; This is usually due to Microsoft being unable to communicate with your webhook.&amp;nbsp; Mine occurred after Microsoft added some new IP's to the graph API and we had to add them to the whitelist in our FW rule.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Dec 2020 18:12:45 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/533212#M64440</guid>
      <dc:creator>adalbor</dc:creator>
      <dc:date>2020-12-15T18:12:45Z</dc:date>
    </item>
    <item>
      <title>Re: Ingesting logs from Microsoft Teams</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/554663#M65828</link>
      <description>&lt;P&gt;&lt;A href="https://Teamswebhook(That" target="_blank"&gt;https://Teamswebhook(That&lt;/A&gt; I have add on step1):4444 is what you will add.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jun 2021 11:21:41 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/554663#M65828</guid>
      <dc:creator>SinghK</dc:creator>
      <dc:date>2021-06-07T11:21:41Z</dc:date>
    </item>
    <item>
      <title>Re: Ingesting logs from Microsoft Teams</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/554667#M65829</link>
      <description>&lt;P&gt;you need to clean the kv store with this command below:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;splunk clean kvstore -app TA_MS_Teams -collection TA_MS_Teams_checkpointer&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;and restart splunk .&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;that should fix the issue.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Jun 2021 11:29:30 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Ingesting-logs-from-Microsoft-Teams/m-p/554667#M65829</guid>
      <dc:creator>SinghK</dc:creator>
      <dc:date>2021-06-07T11:29:30Z</dc:date>
    </item>
  </channel>
</rss>

