<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Minimum permissions to facilitate log ingestion in Getting Data In</title>
    <link>https://community.splunk.com/t5/Getting-Data-In/Minimum-permissions-to-facilitate-log-ingestion/m-p/700272#M115976</link>
    <description>&lt;P&gt;Can the permissions be limited to specific capabilities aside from admin:org for audit events? Or is that a fundamental requirement to pull in audit logs?&lt;/P&gt;</description>
    <pubDate>Thu, 26 Sep 2024 21:11:31 GMT</pubDate>
    <dc:creator>MohammedKhanIUK</dc:creator>
    <dc:date>2024-09-26T21:11:31Z</dc:date>
    <item>
      <title>Minimum permissions to facilitate log ingestion</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Minimum-permissions-to-facilitate-log-ingestion/m-p/700205#M115962</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;I was wanting to get an understanding on what the minimum permissions available to enable the log flow between GitHub and Splunk cloud, as going by the documentation for the app, the account used to pull in the logs requires :&lt;BR /&gt;&lt;SPAN&gt;admin:enterprise &lt;/SPAN&gt;Full control of enterprises&lt;BR /&gt;manage_billing:enterprise Read and write enterprise billing data&lt;BR /&gt;read:enterprise Read enterprise profile data&lt;/P&gt;&lt;P&gt;Can we reduce the amount of high privileged permissions required for the integration ?&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2024 12:25:50 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Minimum-permissions-to-facilitate-log-ingestion/m-p/700205#M115962</guid>
      <dc:creator>MohammedKhanIUK</dc:creator>
      <dc:date>2024-09-26T12:25:50Z</dc:date>
    </item>
    <item>
      <title>Re: Minimum permissions to facilitate log ingestion</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Minimum-permissions-to-facilitate-log-ingestion/m-p/700250#M115971</link>
      <description>&lt;P&gt;I know&amp;nbsp;&lt;SPAN&gt;for configuring all the audit events related to Github Enterprise and Github Organization from GitHub Cloud via modinputwith Account Type = Organization.&lt;BR /&gt;the Personal Access Token also needs the granted access - "admin:org".&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2024 16:42:51 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Minimum-permissions-to-facilitate-log-ingestion/m-p/700250#M115971</guid>
      <dc:creator>sainag_splunk</dc:creator>
      <dc:date>2024-09-26T16:42:51Z</dc:date>
    </item>
    <item>
      <title>Re: Minimum permissions to facilitate log ingestion</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Minimum-permissions-to-facilitate-log-ingestion/m-p/700272#M115976</link>
      <description>&lt;P&gt;Can the permissions be limited to specific capabilities aside from admin:org for audit events? Or is that a fundamental requirement to pull in audit logs?&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2024 21:11:31 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Minimum-permissions-to-facilitate-log-ingestion/m-p/700272#M115976</guid>
      <dc:creator>MohammedKhanIUK</dc:creator>
      <dc:date>2024-09-26T21:11:31Z</dc:date>
    </item>
    <item>
      <title>Re: Minimum permissions to facilitate log ingestion</title>
      <link>https://community.splunk.com/t5/Getting-Data-In/Minimum-permissions-to-facilitate-log-ingestion/m-p/700275#M115977</link>
      <description>&lt;P&gt;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/272592"&gt;@MohammedKhanIUK&lt;/a&gt;&amp;nbsp;I believe that's the requirement.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;NOTE: To collect the audit-logs, the user should have admin access of the organization/enterprise and read:audit_log scope for the Personal Access Token.&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://docs.splunk.com/Documentation/AddOns/released/Github/Configureinputs" target="_blank"&gt;https://docs.splunk.com/Documentation/AddOns/released/Github/Configureinputs&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;If this reply helps you an upvote and "Accept as Solution" is appreciated.&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 26 Sep 2024 22:31:13 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Getting-Data-In/Minimum-permissions-to-facilitate-log-ingestion/m-p/700275#M115977</guid>
      <dc:creator>sainag_splunk</dc:creator>
      <dc:date>2024-09-26T22:31:13Z</dc:date>
    </item>
  </channel>
</rss>

