Configure Message Trace Input for the Splunk Add-on for Microsoft Office 365
Prerequisites: Before you enable inputs, complete the previous steps in the configuration process:
- Configure an integration application in Azure AD for the Splunk Add-on for Microsoft Office 365
- Configure a Tenant in the Splunk Add-on for Microsoft Office 365
- Configure application to have one of the following IAM roles.
- Exchange Administrator
- Global Administrator
- Global Reader role
- Configure application to have the ReportingWebService.Read.All permission. To add the permission, follow the following steps:
- Navigate to Application permissions in the API Permissions > Add a permission
- Select APIs my organisation uses
- Select Office 365 exchange online by searching in the search box
- Select Application Permission, and search for ReportingWebService
- Add the ReportingWebService.Read.All permission
The MessageTrace API for the Splunk Add-on for Microsoft Office 365 does not support data collection for USGovGCC and USGovGCCHigh endpoints.
Configure inputs using Splunk Web
Configure your inputs using Splunk Web on the Splunk platform instance that you have designated as your configuration server, and is responsible for collecting data for this add-on. The best practice for this is usually a heavy forwarder.
- Launch the Splunk add-on for Microsoft Office 365.
- Click on the Inputs tab.
- Click Create New Input.
- Select "Message Trace".
- Enter the Input Name, Tenant Name, Start Date Time, Input Mode, and Index using information in the input parameter table below.
- Click Add.
- Enter the details of the given fields in the input page using the information in the input parameter table below.
- Verify that data is successfully arriving by running the following search on your search head:
If you do not see any events, check the Troubleshooting tab on your data collection node to verify that your accounts, forwarders, and inputs are all configured successfully.sourcetype=o365:reporting:messagetrace
Configure inputs in the configuration files
Configure your inputs using the configuration files on the Splunk platform instance responsible for collecting data for this add-on, usually a heavy forwarder.
- Navigate to
$SPLUNK_HOME/etc/apps/Splunk_ta_o365/local/
, and create aninputs.conf
.
- Open the
inputs.conf
file with a text editor. - Add the following stanza.
[splunk_ta_o365_message_trace://<messagetrace_input_name>] delay_throttle = <value> input_mode = <value> interval = <value> tenant_name = <value> query_window_size = <value> start_date_time = <value> end_date_time = <value> index = <value>
- (Optional) Configure a custom index.
- Restart your Splunk platform instance.
- Verify that data is successfully being ingested by running the following search on your search head:
sourcetype=o365:reporting:messagetrace
If you do not see any events, check the Troubleshooting tab on your data collection node to verify that your accounts, forwarders, and inputs are all configured successfully.
CurrentStatus also includes HistoricalStatus. CurrentStatus uses the interval defined here, but HistoricalStatus uses 86400 (24 hours), because Microsoft generates historical status once per day. For more information, see the Office 365 Service Communications API reference topic in the Microsoft documentation.
- (Optional) Configure a custom
index
. - Restart your Splunk platform instance.
- Verify that data is successfully arriving by running the following search on your search head:
If you do not see any events, check the Troubleshooting tab on your data collection node to verify that your accounts, forwarders, and inputs are all configured successfully.sourcetype=o365:management:activity
Input Parameters
Each attribute in the following table corresponds to a field in Splunk Web.
Input Name | Corresponding field in Splunk Web | Description |
---|---|---|
messagetrace_input_name
|
Name | A unique name for your input. |
tenant_name
|
Tenant Name | Select the configured tenant from where you want to gather data. |
input_mode
|
Input Mode | Input Mode Types:
Continuously Monitor:- Continuously ingesting data into the Splunk platform based on the Query Window Size. Index Once:- Ingest data only once and ignore "Query window size" and "Delay throttle". Additionally, "Start date/time" and "End date/time" are required. |
start_date_time
|
Start Date/Time | Select a Start date/time to specify how far back to go when initially collecting data. This parameter is optional when Continuously Monitor is selected, but the parameter is required when Index Once is selected.
If no date/time is given, the input will start 7 days in the past. |
index
|
Index | The index in which the Microsoft Cloud Services data should be stored. The default is main. |
interval
|
Interval (seconds) | Rerun the input after the defined value, in seconds.
If the Input mode is '''Index Once''' then the interval must be -1 . |
query_window_size
|
Query Window Size (minutes) | When Continuously Monitor is selected, each time this input runs a start date is calculated for the Office 365 API query. The end date for the Office 365 API query will be the calculated start date plus the number of minutes specified by this parameter.
|
delay_throttle
|
Delay Throttle (minutes) | Microsoft may delay trace events for up to 24 hours, and events are not guaranteed to be sequential during this delay. For more information, see the Data granularity, persistence, and availability section of the MessageTrace report topic in the Microsoft documentation.
|
Configure optional settings for the Splunk Add-on for Microsoft Office 365 | Troubleshoot the Splunk Add-on for Microsoft Office 365 |
This documentation applies to the following versions of Splunk® Supported Add-ons: released
Feedback submitted, thanks!