<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Microsoft Azure Add on for Splunk : Problem while getting AAD User logs in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-Azure-Add-on-for-Splunk-Problem-while-getting-AAD-User/m-p/536857#M64674</link>
    <description>&lt;P&gt;A 403 error is typically a permissions issue with the Azure AD app registration.&amp;nbsp; Check the permissions by going to &lt;A href="https://portal.azure.com" target="_self"&gt;https://portal.azure.com&lt;/A&gt;&amp;nbsp; Go to Azure Active Directory &amp;gt; App registrations &amp;gt; find your app registration the add-on is using &amp;gt; API permissions.&amp;nbsp; To get user data, you will need to have Microsoft Graph User.Read.All.&lt;/P&gt;&lt;P&gt;For details on the various permissions needed for specific inputs, refer to this link -&amp;gt;&amp;nbsp;&lt;A href="http://bit.ly/Splunk_Azure_Permissions" target="_blank"&gt;http://bit.ly/Splunk_Azure_Permissions&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 22 Jan 2021 16:31:24 GMT</pubDate>
    <dc:creator>jconger</dc:creator>
    <dc:date>2021-01-22T16:31:24Z</dc:date>
    <item>
      <title>Microsoft Azure Add on for Splunk : Problem while getting AAD User logs</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-Azure-Add-on-for-Splunk-Problem-while-getting-AAD-User/m-p/533786#M64490</link>
      <description>&lt;P&gt;While configuring the AAD User log, I am getting this error. Is there anyone who can help me regrading this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;----------------------------------------------------------------------------------------&lt;/P&gt;&lt;P&gt;&lt;SPAN class="t"&gt;2020-12-22&lt;/SPAN&gt; &lt;SPAN class="t"&gt;08:42:59&lt;/SPAN&gt;&lt;SPAN&gt;,&lt;/SPAN&gt;&lt;SPAN class="t"&gt;793&lt;/SPAN&gt; &lt;SPAN class="t a"&gt;&lt;SPAN class="t"&gt;ERROR&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="t"&gt;pid=13688&lt;/SPAN&gt; &lt;SPAN class="t"&gt;tid=MainThread&lt;/SPAN&gt; &lt;SPAN class="t"&gt;file=base_modinput.py:log_&lt;SPAN class="t a"&gt;error&lt;/SPAN&gt;:309&lt;/SPAN&gt;&lt;SPAN&gt; | &lt;/SPAN&gt;&lt;SPAN class="t"&gt;Get&lt;/SPAN&gt; &lt;SPAN class="t a"&gt;&lt;SPAN class="t"&gt;error&lt;/SPAN&gt;&lt;/SPAN&gt; &lt;SPAN class="t"&gt;when&lt;/SPAN&gt; &lt;SPAN class="t"&gt;collecting&lt;/SPAN&gt; &lt;SPAN class="t"&gt;events.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="t"&gt;Traceback&lt;SPAN&gt; (&lt;/SPAN&gt;most recent call last&lt;SPAN&gt;)&lt;/SPAN&gt;:&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class="raw-event normal  wrap "&gt;&lt;SPAN class="t"&gt;File&lt;/SPAN&gt; "&lt;SPAN class="t"&gt;C:\Program&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Files\Splunk\etc\apps\TA-MS-AAD\bin\ta_ms_aad\aob_py3\modinput_wrapper\base_modinput.py&lt;/SPAN&gt;", &lt;SPAN class="t"&gt;line&lt;/SPAN&gt; &lt;SPAN class="t"&gt;128&lt;/SPAN&gt;, &lt;SPAN class="t"&gt;in&lt;/SPAN&gt; &lt;SPAN class="t"&gt;stream_events&lt;/SPAN&gt; &lt;SPAN class="t"&gt;self.collect_events&lt;/SPAN&gt;(&lt;SPAN class="t"&gt;ew&lt;/SPAN&gt;)&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&lt;SPAN class="t"&gt;File&lt;/SPAN&gt; "&lt;SPAN class="t"&gt;C:\Program&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Files\Splunk\etc\apps\TA-MS-AAD\bin\MS_AAD_user.py&lt;/SPAN&gt;", &lt;SPAN class="t"&gt;line&lt;/SPAN&gt; &lt;SPAN class="t"&gt;76&lt;/SPAN&gt;, &lt;SPAN class="t"&gt;in&lt;/SPAN&gt; &lt;SPAN class="t"&gt;collect_events&lt;/SPAN&gt; &lt;SPAN class="t"&gt;input_module.collect_events&lt;/SPAN&gt;(&lt;SPAN class="t"&gt;self&lt;/SPAN&gt;, &lt;SPAN class="t"&gt;ew&lt;/SPAN&gt;)&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&lt;SPAN class="t"&gt;File&lt;/SPAN&gt; "&lt;SPAN class="t"&gt;C:\Program&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Files\Splunk\etc\apps\TA-MS-AAD\bin\input_module_MS_AAD_user.py&lt;/SPAN&gt;", &lt;SPAN class="t"&gt;line&lt;/SPAN&gt; &lt;SPAN class="t"&gt;36&lt;/SPAN&gt;, &lt;SPAN class="t"&gt;in&lt;/SPAN&gt; &lt;SPAN class="t"&gt;collect_events&lt;/SPAN&gt; &lt;SPAN class="t"&gt;users_response&lt;/SPAN&gt; &lt;SPAN class="t"&gt;=&lt;/SPAN&gt; &lt;SPAN class="t"&gt;azutils.get_items_batch&lt;/SPAN&gt;(&lt;SPAN class="t"&gt;helper&lt;/SPAN&gt;, &lt;SPAN class="t"&gt;access_token&lt;/SPAN&gt;, &lt;SPAN class="t"&gt;url&lt;/SPAN&gt;)&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&lt;SPAN class="t"&gt;File&lt;/SPAN&gt; "&lt;SPAN class="t"&gt;C:\Program&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Files\Splunk\etc\apps\TA-MS-AAD\bin\ta_azure_utils\utils.py&lt;/SPAN&gt;", &lt;SPAN class="t"&gt;line&lt;/SPAN&gt; &lt;SPAN class="t"&gt;55&lt;/SPAN&gt;, &lt;SPAN class="t"&gt;in&lt;/SPAN&gt; &lt;SPAN class="t"&gt;get_items_batch&lt;/SPAN&gt; &lt;SPAN class="t"&gt;raise&lt;/SPAN&gt; &lt;SPAN class="t"&gt;e&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&lt;SPAN class="t"&gt;File&lt;/SPAN&gt; "&lt;SPAN class="t"&gt;C:\Program&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Files\Splunk\etc\apps\TA-MS-AAD\bin\ta_azure_utils\utils.py&lt;/SPAN&gt;", &lt;SPAN class="t"&gt;line&lt;/SPAN&gt; &lt;SPAN class="t"&gt;49&lt;/SPAN&gt;, &lt;SPAN class="t"&gt;in&lt;/SPAN&gt; &lt;SPAN class="t"&gt;get_items_batch&lt;/SPAN&gt; &lt;SPAN class="t"&gt;r.raise_for_status&lt;/SPAN&gt;()&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&lt;SPAN class="t"&gt;File&lt;/SPAN&gt; "&lt;SPAN class="t"&gt;C:\Program&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Files\Splunk\etc\apps\TA-MS-AAD\bin\ta_ms_aad\aob_py3\requests\models.py&lt;/SPAN&gt;", &lt;SPAN class="t"&gt;line&lt;/SPAN&gt; &lt;SPAN class="t"&gt;940&lt;/SPAN&gt;, &lt;SPAN class="t"&gt;in&lt;/SPAN&gt; &lt;SPAN class="t"&gt;raise_for_status&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&lt;SPAN class="t"&gt;raise&lt;/SPAN&gt; &lt;SPAN class="t"&gt;HTTPError&lt;/SPAN&gt;(&lt;SPAN class="t"&gt;http_&lt;SPAN class="t a"&gt;error&lt;/SPAN&gt;_msg&lt;/SPAN&gt;, &lt;SPAN class="t"&gt;response=self&lt;/SPAN&gt;)&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&lt;SPAN class="t"&gt;requests.exceptions.HTTPError:&lt;/SPAN&gt; &lt;SPAN class="t"&gt;403&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Client&lt;/SPAN&gt; &lt;SPAN class="t"&gt;&lt;SPAN class="t a"&gt;Error&lt;/SPAN&gt;:&lt;/SPAN&gt; &lt;SPAN class="t"&gt;Forbidden&lt;/SPAN&gt; &lt;SPAN class="t"&gt;for&lt;/SPAN&gt; &lt;SPAN class="t"&gt;url:&lt;/SPAN&gt; &lt;SPAN class="t"&gt;&lt;A href="https://graph.microsoft.com/beta/users/" target="_blank" rel="noopener"&gt;https://graph.microsoft.com/beta/users/&lt;/A&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&lt;SPAN class="t"&gt;-------------------------------------------------------------------------------------------------------------------&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="raw-event normal  wrap "&gt;&lt;SPAN class="t"&gt;Thanks in advance ....&lt;/SPAN&gt;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN class="t"&gt;&lt;A href="http://localhost:8000/en-GB/app/TA-MS-AAD/search?q=search%20index%3D_internal%20sourcetype%3Dta%3Ams%3Aaad%3Alog%20ERROR&amp;amp;display.page.search.mode=smart&amp;amp;dispatch.sample_ratio=1&amp;amp;workload_pool=&amp;amp;earliest=-24h%40h&amp;amp;latest=now&amp;amp;sid=1608606815.2336#" target="_blank" rel="noopener"&gt;Collapse&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Dec 2020 03:23:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-Azure-Add-on-for-Splunk-Problem-while-getting-AAD-User/m-p/533786#M64490</guid>
      <dc:creator>admin12345678</dc:creator>
      <dc:date>2020-12-22T03:23:24Z</dc:date>
    </item>
    <item>
      <title>Re: Microsoft Azure Add on for Splunk : Problem while getting AAD User logs</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-Azure-Add-on-for-Splunk-Problem-while-getting-AAD-User/m-p/536857#M64674</link>
      <description>&lt;P&gt;A 403 error is typically a permissions issue with the Azure AD app registration.&amp;nbsp; Check the permissions by going to &lt;A href="https://portal.azure.com" target="_self"&gt;https://portal.azure.com&lt;/A&gt;&amp;nbsp; Go to Azure Active Directory &amp;gt; App registrations &amp;gt; find your app registration the add-on is using &amp;gt; API permissions.&amp;nbsp; To get user data, you will need to have Microsoft Graph User.Read.All.&lt;/P&gt;&lt;P&gt;For details on the various permissions needed for specific inputs, refer to this link -&amp;gt;&amp;nbsp;&lt;A href="http://bit.ly/Splunk_Azure_Permissions" target="_blank"&gt;http://bit.ly/Splunk_Azure_Permissions&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 22 Jan 2021 16:31:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/Microsoft-Azure-Add-on-for-Splunk-Problem-while-getting-AAD-User/m-p/536857#M64674</guid>
      <dc:creator>jconger</dc:creator>
      <dc:date>2021-01-22T16:31:24Z</dc:date>
    </item>
  </channel>
</rss>

