Skip to content

Commit 2fd6a8f

Browse files
authored
Merge branch 'develop' into add_Data_source
2 parents 80014e7 + a3f20ac commit 2fd6a8f

File tree

78 files changed

+1389
-1341
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

78 files changed

+1389
-1341
lines changed

contentctl.yml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ app:
33
uid: 3449
44
title: ES Content Updates
55
appid: DA-ESS-ContentUpdate
6-
version: 5.0.0
6+
version: 5.1.0
77
description: Explore the Analytic Stories included with ES Content Updates.
88
prefix: ESCU
99
label: ESCU
@@ -30,11 +30,11 @@ splunk_api_username: null
3030
post_test_behavior: pause_on_failure
3131
apps:
3232
- uid: 1621
33-
title: Splunk Common Information Model (CIM)
33+
title: Splunk_SA_CIM
3434
appid: Splunk_SA_CIM
35-
version: 6.0.1
35+
version: 6.0.2
3636
description: description of app
37-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-common-information-model-cim_601.tgz
37+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-common-information-model-cim_602.tgz
3838
- uid: 6553
3939
title: Splunk Add-on for Okta Identity Cloud
4040
appid: Splunk_TA_okta_identity_cloud
@@ -143,9 +143,9 @@ apps:
143143
- uid: 1876
144144
title: Splunk Add-on for AWS
145145
appid: Splunk_TA_aws
146-
version: 7.9.0
146+
version: 7.9.1
147147
description: description of app
148-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-amazon-web-services-aws_790.tgz
148+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-amazon-web-services-aws_791.tgz
149149
- uid: 3088
150150
title: Splunk Add-on for Google Cloud Platform
151151
appid: SPLUNK_ADD_ON_FOR_GOOGLE_CLOUD_PLATFORM
@@ -161,9 +161,9 @@ apps:
161161
- uid: 3110
162162
title: Splunk Add-on for Microsoft Cloud Services
163163
appid: SPLUNK_TA_MICROSOFT_CLOUD_SERVICES
164-
version: 5.4.2
164+
version: 5.4.3
165165
description: description of app
166-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-cloud-services_542.tgz
166+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-cloud-services_543.tgz
167167
- uid: 4055
168168
title: Splunk Add-on for Microsoft Office 365
169169
appid: SPLUNK_ADD_ON_FOR_MICROSOFT_OFFICE_365

data_sources/asl_aws_cloudtrail.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,4 +10,4 @@ separator: api.operation
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.9.0
13+
version: 7.9.1

data_sources/aws_cloudfront.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ sourcetype: aws:cloudfront:accesslogs
99
supported_TA:
1010
- name: Splunk Add-on for AWS
1111
url: https://splunkbase.splunk.com/app/1876
12-
version: 7.9.0
12+
version: 7.9.1
1313
fields:
1414
- _time
1515
- action

data_sources/aws_cloudtrail.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,4 +10,4 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.9.0
13+
version: 7.9.1

data_sources/aws_cloudtrail_assumerolewithsaml.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.9.0
13+
version: 7.9.1
1414
fields:
1515
- _time
1616
- action

data_sources/aws_cloudtrail_consolelogin.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.9.0
13+
version: 7.9.1
1414
fields:
1515
- _time
1616
- action

data_sources/aws_cloudtrail_copyobject.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.9.0
13+
version: 7.9.1
1414
fields:
1515
- _time
1616
- additionalEventData.AuthenticationMethod

data_sources/aws_cloudtrail_createaccesskey.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.9.0
13+
version: 7.9.1
1414
fields:
1515
- _time
1616
- action

data_sources/aws_cloudtrail_createkey.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.9.0
13+
version: 7.9.1
1414
fields:
1515
- _time
1616
- app

data_sources/aws_cloudtrail_createloginprofile.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.9.0
13+
version: 7.9.1
1414
fields:
1515
- _time
1616
- action

0 commit comments

Comments
 (0)