All Apps and Add-ons

Message Trace - Splunk Add-On for Microsoft Office 365

shaunm001
Explorer

Hi, we've configured the "Message Trace" input type for Splunk Add-On for Microsoft Office 365 but don't seem to be receiving any data. Other input types (Mailbox, Management Activity, etc) are working. Not sure what the problem is, any suggestions on how to troubleshoot? 

I did notice a discrepancy when viewing the current configuration of the input versus the options available when editing the input (the same value is reported "in days" in one place and "in minutes" in another):

shaunm001_0-1738260370746.png

Could it be my delay throttle truly is set to 1440 days rather than minutes?

I believe I have all the API permissions set correctly, but let me know if this doesn't look right:

shaunm001_1-1738260495247.png

 

Labels (1)
0 Karma
1 Solution

Meett
Splunk Employee
Splunk Employee

@shaunm001 You can check the source-type along with index you are searching to it should’ve presence of MessageTrace, i can’t see much on your environment but if you still have confusion you can put down support case to get more help.

View solution in original post

Meett
Splunk Employee
Splunk Employee

Hello @shaunm001 ,

Can you please check internal log specific to this input ? is there any ERROR logs present? 

0 Karma

shaunm001
Explorer

Hello, I'm not exactly sure where to check the logs for this Add-On. Am I looking in Splunk or am I looking on the Azure side?

0 Karma

Meett
Splunk Employee
Splunk Employee

Hello @shaunm001 ,

You should first check internal logs in Splunk using Query such as,

index="_internal" *O365* *ERROR*

Based on ERROR logs we can troubleshoot this further.

0 Karma

shaunm001
Explorer

There are no "ERROR" messages associated with the message trace input, but there are numerous "INFO" messages that seem to indicate data is being successfully brought in:

shaunm001_0-1738701280459.png

I just dont see anything that looks like a message trace entry when searching the index that I've configured for these logs.  Unless it's these "Exchange" records that show operations like "Send"," MailItemsAccessed" etc, but I feel like those are coming from a different input (e.g., the "Mailbox Usage Detail" input):

shaunm001_2-1738701804344.png

 

 

0 Karma

Meett
Splunk Employee
Splunk Employee

@shaunm001 You can check the source-type along with index you are searching to it should’ve presence of MessageTrace, i can’t see much on your environment but if you still have confusion you can put down support case to get more help.

shaunm001
Explorer

Ah, I do see it now, thanks. I was assuming all data would be included in one of the "Workload" (e.g. "Exchange") or "app" data values, but the sourcetype "o365:reporting:messagetrace" does not have "Workload" or "app" data values and I was excluding the message trace events with search parameters like "Workload="*""

Appreciate the help! 

0 Karma
Get Updates on the Splunk Community!

Announcing the Expansion of the Splunk Academic Alliance Program

The Splunk Community is more than just an online forum — it’s a network of passionate users, administrators, ...

Learn Splunk Insider Insights, Do More With Gen AI, & Find 20+ New Use Cases You Can ...

Splunk Lantern is a Splunk customer success center that provides advice from Splunk experts on valuable data ...

Buttercup Games: Further Dashboarding Techniques (Part 7)

This series of blogs assumes you have already completed the Splunk Enterprise Search Tutorial as it uses the ...