Getting Data In

Splunk TA Cloud Services authentication error Cisco Umbrella user?

dkeck
Influencer

Hello,

does anyone here have an idea why cisco cloud security umbrella addon is interfering the authentication within Splunk TA Cloud Services?

I try to ingest nsg flow data via a storage blob. All the other inputs within the Cloud Services TA are working (azure audit data via eventhub). When I disable the umbrella TA nsg flow logs can be received without a problem.
 

 

 

 

File "/opt/splunk/etc/apps/Splunk_TA_microsoft-cloudservices/lib/solnlib/credentials.py", line 137, in get_password f"Failed to get password of realm={self._realm}, user={user}." solnlib.credentials.CredentialNotExistException: Failed to get password of realm=__REST_CREDENTIAL__#Splunk_TA_microsoft-cloudservices#configs/conf-inputs, user=cisco_cloud_security_umbrella_addon://UmbrellaDNS.

 

 

 


Feels like some python issue? 

Thankful for any hint I can get.

David

Labels (1)
1 Solution

dkeck
Influencer

I moved the umbrella TA to a different HF. Wokred for me, but still just a workaround.

View solution in original post

0 Karma

dkeck
Influencer

I moved the umbrella TA to a different HF. Wokred for me, but still just a workaround.

0 Karma
Get Updates on the Splunk Community!

Splunk Search APIを使えば調査過程が残せます

   このゲストブログは、JCOM株式会社の情報セキュリティ本部・専任部長である渡辺慎太郎氏によって執筆されました。 Note: This article is published in both Japanese ...

Integrating Splunk Search API and Quarto to Create Reproducible Investigation ...

 Splunk is More Than Just the Web Console For Digital Forensics and Incident Response (DFIR) practitioners, ...

Congratulations to the 2025-2026 SplunkTrust!

Hello, Splunk Community! We are beyond thrilled to announce our newest group of SplunkTrust members!  The ...