Skip to content

Commit d2592c5

Browse files
authored
Merge pull request #3270 from splunk/auto-ta-update-139
Automated Splunk TA Update 139
2 parents be3ab3c + 1ce4f77 commit d2592c5

File tree

72 files changed

+83
-77
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

72 files changed

+83
-77
lines changed

contentctl.yml

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -32,9 +32,9 @@ apps:
3232
- uid: 1621
3333
title: Splunk Common Information Model (CIM)
3434
appid: Splunk_SA_CIM
35-
version: 6.0.0
35+
version: 6.0.1
3636
description: description of app
37-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-common-information-model-cim_600.tgz
37+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-common-information-model-cim_601.tgz
3838
- uid: 6553
3939
title: Splunk Add-on for Okta Identity Cloud
4040
appid: Splunk_TA_okta_identity_cloud
@@ -137,9 +137,9 @@ apps:
137137
- uid: 1876
138138
title: Splunk Add-on for AWS
139139
appid: Splunk_TA_aws
140-
version: 7.8.0
140+
version: 7.9.0
141141
description: description of app
142-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-amazon-web-services-aws_780.tgz
142+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-amazon-web-services-aws_790.tgz
143143
- uid: 3088
144144
title: Splunk Add-on for Google Cloud Platform
145145
appid: SPLUNK_ADD_ON_FOR_GOOGLE_CLOUD_PLATFORM
@@ -161,9 +161,9 @@ apps:
161161
- uid: 4055
162162
title: Splunk Add-on for Microsoft Office 365
163163
appid: SPLUNK_ADD_ON_FOR_MICROSOFT_OFFICE_365
164-
version: 4.6.0
164+
version: 4.7.0
165165
description: description of app
166-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-office-365_460.tgz
166+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-office-365_470.tgz
167167
- uid: 2890
168168
title: Splunk Machine Learning Toolkit
169169
appid: SPLUNK_MACHINE_LEARNING_TOOLKIT
@@ -200,4 +200,10 @@ apps:
200200
version: 3.2.1
201201
description: description of app
202202
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/crowdstrike-falcon-event-streams-technical-add-on_321.tgz
203+
- uid: 2882
204+
title: Python for Scientific Computing (for Linux 64-bit)
205+
appid: Splunk_SA_Scientific_Python_linux_x86_64
206+
version: 4.2.2
207+
description: PSC for MLTK
208+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/python-for-scientific-computing-for-linux-64-bit_422.tgz
203209
githash: d6fac80e6d50ae06b40f91519a98489d4ce3a3fd

data_sources/aws_cloudfront.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ sourcetype: aws:cloudfront:accesslogs
99
supported_TA:
1010
- name: Splunk Add-on for AWS
1111
url: https://splunkbase.splunk.com/app/1876
12-
version: 7.8.0
12+
version: 7.9.0
1313
fields:
1414
- _time
1515
- action

data_sources/aws_cloudtrail.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,4 +10,4 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.8.0
13+
version: 7.9.0

data_sources/aws_cloudtrail_assumerolewithsaml.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.8.0
13+
version: 7.9.0
1414
fields:
1515
- _time
1616
- action

data_sources/aws_cloudtrail_consolelogin.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.8.0
13+
version: 7.9.0
1414
fields:
1515
- _time
1616
- action

data_sources/aws_cloudtrail_copyobject.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.8.0
13+
version: 7.9.0
1414
fields:
1515
- _time
1616
- additionalEventData.AuthenticationMethod

data_sources/aws_cloudtrail_createaccesskey.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.8.0
13+
version: 7.9.0
1414
fields:
1515
- _time
1616
- action

data_sources/aws_cloudtrail_createkey.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.8.0
13+
version: 7.9.0
1414
fields:
1515
- _time
1616
- app

data_sources/aws_cloudtrail_createloginprofile.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.8.0
13+
version: 7.9.0
1414
fields:
1515
- _time
1616
- action

data_sources/aws_cloudtrail_createnetworkaclentry.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.8.0
13+
version: 7.9.0
1414
fields:
1515
- _time
1616
- action

0 commit comments

Comments
 (0)