Skip to content

Commit 5f50227

Browse files
committed
Added notice for ingestors user permission behaviour
1 parent 171e9ef commit 5f50227

File tree

1 file changed

+6
-0
lines changed

1 file changed

+6
-0
lines changed

docs/IntelOwl/usage.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -394,6 +394,12 @@ Ingestors can be _spammy_ so be careful about enabling them.
394394

395395
A very powerful use is case is to **combine Ingestors with Connectors** to automatically extract data from external sources, analyze them with IntelOwl and push them externally to another platform (like MISP or a SIEM)
396396

397+
**Notice**: ingestors are run with robot user that are most likely different from the user you usually use to run analysis.
398+
This can lead to a permission mismatch when assigning parameter through plugin config via GUI.
399+
To solve this mismatch you should go to the "Plugin config" section of the admin page. Here you'll see the value that you assigned to the parameter.
400+
You should change the "owner" of this configuration to the user that runs the ingestor instead of the one that assigned the value.
401+
402+
397403
#### List of pre-built Ingestors
398404

399405
- `ThreatFox`: Retrieves daily ioc from `https://threatfox.abuse.ch/` and analyze them.

0 commit comments

Comments
 (0)