Issue when configure connection string for Windows Defender ATP.
Shows this in log file ta_windows_defender_windows_defender_atp_alerts.log :
2019-08-02 14:46:37,060 INFO pid=18110 tid=MainThread file=connectionpool.py:_new_conn:758 | Starting new HTTPS connection (1): 127.0.0.1
2019-08-02 14:46:38,018 INFO pid=18110 tid=MainThread file=connectionpool.py:_new_conn:758 | Starting new HTTPS connection (1): 127.0.0.1
2019-08-02 14:46:39,513 INFO pid=18110 tid=MainThread file=connectionpool.py:_new_conn:758 | Starting new HTTPS connection (1): 127.0.0.1
2019-08-02 14:46:41,071 INFO pid=18110 tid=MainThread file=connectionpool.py:_new_conn:758 | Starting new HTTPS connection (1): 127.0.0.1
2019-08-02 14:46:42,585 INFO pid=18110 tid=MainThread file=splunk_rest_client.py:_request_handler:100 | Use HTTP connection pooling
2019-08-02 14:46:42,586 INFO pid=18110 tid=MainThread file=connectionpool.py:_new_conn:758 | Starting new HTTPS connection (1): 127.0.0.1
2019-08-02 14:46:42,600 INFO pid=18110 tid=MainThread file=setup_util.py:log_info:114 | Proxy is not enabled!
2019-08-02 14:46:42,770 ERROR pid=18110 tid=MainThread file=base_modinput.py:log_error:307 | No JSON object could be decoded
2019-08-02 14:46:42,771 ERROR pid=18110 tid=MainThread file=base_modinput.py:log_error:307 | Get error when collecting events.
Traceback (most recent call last):
File "/opt/splunk/etc/apps/TA_windows-defender/bin/ta_windows_defender/modinput_wrapper/base_modinput.py", line 127, in stream_events
self.collect_events(ew)
File "/opt/splunk/etc/apps/TA_windows-defender/bin/windows_defender_atp_alerts.py", line 88, in collect_events
input_module.collect_events(self, ew)
File "/opt/splunk/etc/apps/TA_windows-defender/bin/input_module_windows_defender_atp_alerts.py", line 151, in collect_events
"Authorization": 'Bearer ' + access_token,
TypeError: cannot concatenate 'str' and 'NoneType' objects
... View more