All Apps and Add-ons

Message Trace - Splunk Add-On for Microsoft Office 365

shaunm001
Explorer

Hi, we've configured the "Message Trace" input type for Splunk Add-On for Microsoft Office 365 but don't seem to be receiving any data. Other input types (Mailbox, Management Activity, etc) are working. Not sure what the problem is, any suggestions on how to troubleshoot? 

I did notice a discrepancy when viewing the current configuration of the input versus the options available when editing the input (the same value is reported "in days" in one place and "in minutes" in another):

shaunm001_0-1738260370746.png

Could it be my delay throttle truly is set to 1440 days rather than minutes?

I believe I have all the API permissions set correctly, but let me know if this doesn't look right:

shaunm001_1-1738260495247.png

 

Labels (1)
0 Karma
1 Solution

Meett
Splunk Employee
Splunk Employee

@shaunm001 You can check the source-type along with index you are searching to it should’ve presence of MessageTrace, i can’t see much on your environment but if you still have confusion you can put down support case to get more help.

View solution in original post

Meett
Splunk Employee
Splunk Employee

Hello @shaunm001 ,

Can you please check internal log specific to this input ? is there any ERROR logs present? 

0 Karma

shaunm001
Explorer

Hello, I'm not exactly sure where to check the logs for this Add-On. Am I looking in Splunk or am I looking on the Azure side?

0 Karma

Meett
Splunk Employee
Splunk Employee

Hello @shaunm001 ,

You should first check internal logs in Splunk using Query such as,

index="_internal" *O365* *ERROR*

Based on ERROR logs we can troubleshoot this further.

0 Karma

shaunm001
Explorer

There are no "ERROR" messages associated with the message trace input, but there are numerous "INFO" messages that seem to indicate data is being successfully brought in:

shaunm001_0-1738701280459.png

I just dont see anything that looks like a message trace entry when searching the index that I've configured for these logs.  Unless it's these "Exchange" records that show operations like "Send"," MailItemsAccessed" etc, but I feel like those are coming from a different input (e.g., the "Mailbox Usage Detail" input):

shaunm001_2-1738701804344.png

 

 

0 Karma

Meett
Splunk Employee
Splunk Employee

@shaunm001 You can check the source-type along with index you are searching to it should’ve presence of MessageTrace, i can’t see much on your environment but if you still have confusion you can put down support case to get more help.

shaunm001
Explorer

Ah, I do see it now, thanks. I was assuming all data would be included in one of the "Workload" (e.g. "Exchange") or "app" data values, but the sourcetype "o365:reporting:messagetrace" does not have "Workload" or "app" data values and I was excluding the message trace events with search parameters like "Workload="*""

Appreciate the help! 

0 Karma
Get Updates on the Splunk Community!

Advanced Splunk Data Management Strategies

Join us on Wednesday, May 14, 2025, at 11 AM PDT / 2 PM EDT for an exclusive Tech Talk that delves into ...

Uncovering Multi-Account Fraud with Splunk Banking Analytics

Last month, I met with a Senior Fraud Analyst at a nationally recognized bank to discuss their recent success ...

Secure Your Future: A Deep Dive into the Compliance and Security Enhancements for the ...

What has been announced?  In the blog, “Preparing your Splunk Environment for OpensSSL3,”we announced the ...