Skip to content

Commit a3527bb

Browse files
authored
Merge branch 'develop' into cisco-ios-snort
2 parents fa9c240 + 06db914 commit a3527bb

14 files changed

+20
-19
lines changed

.github/CODEOWNERS

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,3 @@
11
* @patel-bhavin @ljstella @nasbench
2-
/response_templates/ @kbouchardherjavecgroup @ccl0utier
2+
/response_templates/ @kbouchardherjavecgroup @ccl0utier @henryy-splunk
3+
/.github/workflows/response_templates/mcopenapi_public.yml @kbouchardherjavecgroup @ccl0utier @henryy-splunk

contentctl.yml

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -44,9 +44,9 @@ apps:
4444
- uid: 7404
4545
title: Cisco Security Cloud
4646
appid: CiscoSecurityCloud
47-
version: 3.5.2
47+
version: 3.5.3
4848
description: description of app
49-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/cisco-security-cloud_352.tgz
49+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/cisco-security-cloud_353.tgz
5050
- uid: 6652
5151
title: Add-on for Linux Sysmon
5252
appid: Splunk_TA_linux_sysmon
@@ -179,9 +179,9 @@ apps:
179179
- uid: 5518
180180
title: Splunk add on for Microsoft Defender Advanced Hunting
181181
appid: SPLUNK_ADD_ON_FOR_MICROSOFT_DEFENDER_ADVANCED_HUNTING
182-
version: 1.4.1
182+
version: 1.4.2
183183
description: description of app
184-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/microsoft-defender-advanced-hunting-add-on-for-splunk_141.tgz
184+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/microsoft-defender-advanced-hunting-add-on-for-splunk_142.tgz
185185
- uid: 6207
186186
title: Splunk Add-on for Microsoft Security
187187
appid: Splunk_TA_MS_Security
@@ -221,10 +221,10 @@ apps:
221221
- uid: 3471
222222
title: Splunk Add-on for AppDynamics
223223
appid: Splunk_TA_AppDynamics
224-
version: 3.1.5
224+
version: 3.1.6
225225
description: The Splunk Add-on for AppDynamics enables you to easily configure data
226226
inputs to pull data from AppDynamics' REST APIs
227-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/cisco-splunk-add-on-for-appdynamics_315.tgz
227+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/cisco-splunk-add-on-for-appdynamics_316.tgz
228228
- uid: 4221
229229
title: Cisco NVM Add-on for Splunk
230230
appid: TA-Cisco-NVM

data_sources/cisco_ai_defense_alerts.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,5 +10,5 @@ separator: null
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.5.2
13+
version: 3.5.3
1414
fields: null

data_sources/cisco_asa_logs.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ separator: null
2121
supported_TA:
2222
- name: Cisco Security Cloud
2323
url: https://splunkbase.splunk.com/app/7404
24-
version: 3.5.2
24+
version: 3.5.3
2525
fields:
2626
- Cisco_ASA_action
2727
- Cisco_ASA_message_id

data_sources/cisco_duo_activity.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: null
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.5.2
13+
version: 3.5.3
1414
fields:
1515
- access_device.browser
1616
- access_device.browser_version

data_sources/cisco_duo_administrator.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: null
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.5.2
13+
version: 3.5.3
1414
fields:
1515
- action
1616
- actionlabel

data_sources/cisco_isovalent_process_connect.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ sourcetype: cisco:isovalent:processConnect
1313
supported_TA:
1414
- name: Cisco Security Cloud
1515
url: https://splunkbase.splunk.com/app/7404
16-
version: 3.5.2
16+
version: 3.5.3
1717
fields:
1818
- _time
1919
- app

data_sources/cisco_isovalent_process_exec.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ sourcetype: cisco:isovalent:processExec
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.5.2
13+
version: 3.5.3
1414
fields:
1515
- _time
1616
- cluster_name

data_sources/cisco_isovalent_process_kprobe.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ sourcetype: cisco:isovalent
1212
supported_TA:
1313
- name: Cisco Security Cloud
1414
url: https://splunkbase.splunk.com/app/7404
15-
version: 3.5.2
15+
version: 3.5.3
1616
fields:
1717
- _time
1818
- app

data_sources/cisco_secure_firewall_threat_defense_connection_event.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ sourcetype: cisco:sfw:estreamer
1010
supported_TA:
1111
- name: Cisco Security Cloud
1212
url: https://splunkbase.splunk.com/app/7404
13-
version: 3.5.2
13+
version: 3.5.3
1414
fields:
1515
- AC_RuleAction
1616
- action

0 commit comments

Comments
 (0)