Skip to content

Commit c599382

Browse files
authored
Merge pull request #3521 from splunk/auto-ta-update-264
Automated Splunk TA Update 264
2 parents 385800d + 5940725 commit c599382

File tree

63 files changed

+179
-151
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

63 files changed

+179
-151
lines changed

.github/workflows/unit-testing.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -43,25 +43,25 @@ jobs:
4343
git switch new_branch_for_testing
4444
contentctl test --verbose --disable-tqdm --no-enable-integration-testing --container-settings.num-containers 2 --post-test-behavior never_pause mode:changes --mode.target-branch ${{ github.base_ref }}
4545
echo "contentctl test - COMPLETED"
46-
continue-on-error: true
4746
4847
# Store test_results/summary.yml and dist/DA-ESS-ContentUpdate-latest.tar.gz to job artifact-test_summary_results.zip
4948
- name: store_artifacts
49+
if: always()
5050
uses: actions/upload-artifact@v4
5151
with:
5252
name: test_summary_results
5353
path: |
5454
test_results/summary.yml
5555
dist/DA-ESS-ContentUpdate-latest.tar.gz
56-
continue-on-error: true
5756
5857
# Print entire result summary so that the users can view it in the Github Actions logs
5958
- name: Print entire test_results/summary.yml
59+
if: always()
6060
run: cat test_results/summary.yml
61-
continue-on-error: true
6261

6362
# Run a simple custom script created to pretty print results in a markdown friendly format in Github Actions Summary
6463
- name: Check the test_results/summary.yml for pass/fail.
64+
if: always()
6565
run: |
6666
echo "This job will fail if there are failures in unit-testing"
6767
python .github/workflows/format_test_results.py >> $GITHUB_STEP_SUMMARY

contentctl.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -143,9 +143,9 @@ apps:
143143
- uid: 1876
144144
title: Splunk Add-on for AWS
145145
appid: Splunk_TA_aws
146-
version: 7.9.1
146+
version: 7.10.0
147147
description: description of app
148-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-amazon-web-services-aws_791.tgz
148+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-amazon-web-services-aws_7100.tgz
149149
- uid: 3088
150150
title: Splunk Add-on for Google Cloud Platform
151151
appid: SPLUNK_ADD_ON_FOR_GOOGLE_CLOUD_PLATFORM

data_sources/asl_aws_cloudtrail.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ separator: api.operation
2323
supported_TA:
2424
- name: Splunk Add-on for AWS
2525
url: https://splunkbase.splunk.com/app/1876
26-
version: 7.9.1
26+
version: 7.10.0
2727
output_fields:
2828
- dest
2929
- user

data_sources/aws_cloudfront.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ sourcetype: aws:cloudfront:accesslogs
1717
supported_TA:
1818
- name: Splunk Add-on for AWS
1919
url: https://splunkbase.splunk.com/app/1876
20-
version: 7.9.1
20+
version: 7.10.0
2121
fields:
2222
- _time
2323
- action

data_sources/aws_cloudtrail.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,4 +10,4 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.9.1
13+
version: 7.10.0

data_sources/aws_cloudtrail_assumerolewithsaml.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ separator_value: AssumeRoleWithSAML
1818
supported_TA:
1919
- name: Splunk Add-on for AWS
2020
url: https://splunkbase.splunk.com/app/1876
21-
version: 7.9.1
21+
version: 7.10.0
2222
fields:
2323
- _time
2424
- action

data_sources/aws_cloudtrail_consolelogin.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ separator_value: ConsoleLogin
1818
supported_TA:
1919
- name: Splunk Add-on for AWS
2020
url: https://splunkbase.splunk.com/app/1876
21-
version: 7.9.1
21+
version: 7.10.0
2222
fields:
2323
- _time
2424
- action
@@ -115,4 +115,4 @@ output_fields:
115115
- src
116116
- vendor_account
117117
- vendor_region
118-
- vendor_product
118+
- vendor_product

data_sources/aws_cloudtrail_copyobject.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ separator_value: CopyObject
1717
supported_TA:
1818
- name: Splunk Add-on for AWS
1919
url: https://splunkbase.splunk.com/app/1876
20-
version: 7.9.1
20+
version: 7.10.0
2121
fields:
2222
- _time
2323
- additionalEventData.AuthenticationMethod
@@ -131,4 +131,4 @@ output_fields:
131131
- src
132132
- vendor_account
133133
- vendor_region
134-
- vendor_product
134+
- vendor_product

data_sources/aws_cloudtrail_createaccesskey.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ separator_value: CreateAccessKey
1717
supported_TA:
1818
- name: Splunk Add-on for AWS
1919
url: https://splunkbase.splunk.com/app/1876
20-
version: 7.9.1
20+
version: 7.10.0
2121
fields:
2222
- _time
2323
- action
@@ -115,4 +115,4 @@ output_fields:
115115
- src
116116
- vendor_account
117117
- vendor_region
118-
- vendor_product
118+
- vendor_product

data_sources/aws_cloudtrail_createkey.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ separator_value: CreateKey
1717
supported_TA:
1818
- name: Splunk Add-on for AWS
1919
url: https://splunkbase.splunk.com/app/1876
20-
version: 7.9.1
20+
version: 7.10.0
2121
fields:
2222
- _time
2323
- app
@@ -162,4 +162,4 @@ output_fields:
162162
- src
163163
- vendor_account
164164
- vendor_region
165-
- vendor_product
165+
- vendor_product

0 commit comments

Comments
 (0)