Skip to content

Commit 655b836

Browse files
authored
Merge branch 'develop' into xworm
2 parents 10c8444 + 7a214c4 commit 655b836

File tree

84 files changed

+545
-464
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

84 files changed

+545
-464
lines changed

.github/workflows/unit-testing.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,25 +43,25 @@ jobs:
4343
git switch new_branch_for_testing
4444
contentctl test --verbose --disable-tqdm --no-enable-integration-testing --container-settings.num-containers 2 --post-test-behavior never_pause mode:changes --mode.target-branch ${{ github.base_ref }}
4545
echo "contentctl test - COMPLETED"
46-
continue-on-error: true
4746
4847
# Store test_results/summary.yml and dist/DA-ESS-ContentUpdate-latest.tar.gz to job artifact-test_summary_results.zip
4948
- name: store_artifacts
49+
if: always()
5050
uses: actions/upload-artifact@v4
5151
with:
5252
name: test_summary_results
5353
path: |
5454
test_results/summary.yml
5555
dist/DA-ESS-ContentUpdate-latest.tar.gz
56-
continue-on-error: true
5756
5857
# Print entire result summary so that the users can view it in the Github Actions logs
5958
- name: Print entire test_results/summary.yml
59+
if: always()
6060
run: cat test_results/summary.yml
61-
continue-on-error: true
6261

6362
# Run a simple custom script created to pretty print results in a markdown friendly format in Github Actions Summary
6463
- name: Check the test_results/summary.yml for pass/fail.
64+
if: always()
6565
run: |
6666
echo "This job will fail if there are failures in unit-testing"
6767
python .github/workflows/format_test_results.py >> $GITHUB_STEP_SUMMARY

contentctl.yml

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -44,9 +44,9 @@ apps:
4444
- uid: 7404
4545
title: Cisco Security Cloud
4646
appid: CiscoSecurityCloud
47-
version: 3.1.1
47+
version: 3.2.0
4848
description: description of app
49-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/cisco-security-cloud_311.tgz
49+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/cisco-security-cloud_320.tgz
5050
- uid: 6652
5151
title: Add-on for Linux Sysmon
5252
appid: Splunk_TA_linux_sysmon
@@ -101,9 +101,9 @@ apps:
101101
- uid: 5466
102102
title: TA for Zeek
103103
appid: SPLUNK_TA_FOR_ZEEK
104-
version: 1.0.8
104+
version: 1.0.9
105105
description: description of app
106-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/ta-for-zeek_108.tgz
106+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/ta-for-zeek_109.tgz
107107
- uid: 3258
108108
title: Splunk Add-on for NGINX
109109
appid: SPLUNK_ADD_ON_FOR_NGINX
@@ -143,9 +143,9 @@ apps:
143143
- uid: 1876
144144
title: Splunk Add-on for AWS
145145
appid: Splunk_TA_aws
146-
version: 7.9.1
146+
version: 7.10.0
147147
description: description of app
148-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-amazon-web-services-aws_791.tgz
148+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-amazon-web-services-aws_7100.tgz
149149
- uid: 3088
150150
title: Splunk Add-on for Google Cloud Platform
151151
appid: SPLUNK_ADD_ON_FOR_GOOGLE_CLOUD_PLATFORM
@@ -155,9 +155,9 @@ apps:
155155
- uid: 5556
156156
title: Splunk Add-on for Google Workspace
157157
appid: SPLUNK_ADD_ON_FOR_GOOGLE_WORKSPACE
158-
version: 3.0.3
158+
version: 3.0.4
159159
description: description of app
160-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-google-workspace_303.tgz
160+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-google-workspace_304.tgz
161161
- uid: 3110
162162
title: Splunk Add-on for Microsoft Cloud Services
163163
appid: SPLUNK_TA_MICROSOFT_CLOUD_SERVICES

data_sources/asl_aws_cloudtrail.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ separator: api.operation
2323
supported_TA:
2424
- name: Splunk Add-on for AWS
2525
url: https://splunkbase.splunk.com/app/1876
26-
version: 7.9.1
26+
version: 7.10.0
2727
output_fields:
2828
- dest
2929
- user

data_sources/aws_cloudfront.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ sourcetype: aws:cloudfront:accesslogs
1717
supported_TA:
1818
- name: Splunk Add-on for AWS
1919
url: https://splunkbase.splunk.com/app/1876
20-
version: 7.9.1
20+
version: 7.10.0
2121
fields:
2222
- _time
2323
- action

data_sources/aws_cloudtrail.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,4 +10,4 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.9.1
13+
version: 7.10.0

data_sources/aws_cloudtrail_assumerolewithsaml.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ separator_value: AssumeRoleWithSAML
1818
supported_TA:
1919
- name: Splunk Add-on for AWS
2020
url: https://splunkbase.splunk.com/app/1876
21-
version: 7.9.1
21+
version: 7.10.0
2222
fields:
2323
- _time
2424
- action

data_sources/aws_cloudtrail_consolelogin.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ separator_value: ConsoleLogin
1818
supported_TA:
1919
- name: Splunk Add-on for AWS
2020
url: https://splunkbase.splunk.com/app/1876
21-
version: 7.9.1
21+
version: 7.10.0
2222
fields:
2323
- _time
2424
- action
@@ -115,4 +115,4 @@ output_fields:
115115
- src
116116
- vendor_account
117117
- vendor_region
118-
- vendor_product
118+
- vendor_product

data_sources/aws_cloudtrail_copyobject.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ separator_value: CopyObject
1717
supported_TA:
1818
- name: Splunk Add-on for AWS
1919
url: https://splunkbase.splunk.com/app/1876
20-
version: 7.9.1
20+
version: 7.10.0
2121
fields:
2222
- _time
2323
- additionalEventData.AuthenticationMethod
@@ -131,4 +131,4 @@ output_fields:
131131
- src
132132
- vendor_account
133133
- vendor_region
134-
- vendor_product
134+
- vendor_product

data_sources/aws_cloudtrail_createaccesskey.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ separator_value: CreateAccessKey
1717
supported_TA:
1818
- name: Splunk Add-on for AWS
1919
url: https://splunkbase.splunk.com/app/1876
20-
version: 7.9.1
20+
version: 7.10.0
2121
fields:
2222
- _time
2323
- action
@@ -115,4 +115,4 @@ output_fields:
115115
- src
116116
- vendor_account
117117
- vendor_region
118-
- vendor_product
118+
- vendor_product

data_sources/aws_cloudtrail_createkey.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ separator_value: CreateKey
1717
supported_TA:
1818
- name: Splunk Add-on for AWS
1919
url: https://splunkbase.splunk.com/app/1876
20-
version: 7.9.1
20+
version: 7.10.0
2121
fields:
2222
- _time
2323
- app
@@ -162,4 +162,4 @@ output_fields:
162162
- src
163163
- vendor_account
164164
- vendor_region
165-
- vendor_product
165+
- vendor_product

0 commit comments

Comments
 (0)