Skip to content

Commit d7629fe

Browse files
authored
Merge branch 'develop' into new-research-detection-endpoint
2 parents 990d09e + 6adf586 commit d7629fe

File tree

5 files changed

+7
-7
lines changed

5 files changed

+7
-7
lines changed

contentctl.yml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,8 +21,8 @@ test_instance:
2121
hec_port: 8088
2222
web_ui_port: 8000
2323
api_port: 8089
24-
full_image_path: registry.hub.docker.com/splunk/splunk:latest
2524
container_settings:
25+
full_image_path: registry.hub.docker.com/splunk/splunk:9.3
2626
leave_running: true
2727
num_containers: 1
2828
mode: {}
@@ -77,9 +77,9 @@ apps:
7777
- uid: 5579
7878
title: Splunk Add-on for CrowdStrike FDR
7979
appid: Splunk_TA_CrowdStrike_FDR
80-
version: 2.0.2
80+
version: 2.0.3
8181
description: description of app
82-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-crowdstrike-fdr_202.tgz
82+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-crowdstrike-fdr_203.tgz
8383
- uid: 3185
8484
title: Splunk Add-on for Microsoft IIS
8585
appid: SPLUNK_TA_FOR_IIS

data_sources/crowdstrike_processrollup2.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: event_simpleName
1010
supported_TA:
1111
- name: Splunk Add-on for CrowdStrike FDR
1212
url: https://splunkbase.splunk.com/app/5579
13-
version: 2.0.2
13+
version: 2.0.3
1414
fields:
1515
- AuthenticationId
1616
- AuthenticationId_meaning

macros/f5_bigip_rogue.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
definition: index=netops sourcetype="f5:bigip:rogue"
1+
definition: sourcetype="f5:bigip:rogue"
22
description: customer specific splunk configurations(eg- index, source, sourcetype).
33
Replace the macro definition with configurations for your Splunk Environment.
44
name: f5_bigip_rogue

macros/zeek_rpc.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
definition: index=zeek sourcetype="zeek:rpc:json"
1+
definition: sourcetype="zeek:rpc:json"
22
description: customer specific splunk configurations(eg- index, source, sourcetype).
33
Replace the macro definition with configurations for your Splunk Environment.
44
name: zeek_rpc

macros/zeek_ssl.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
definition: index=zeek sourcetype="zeek:ssl:json"
1+
definition: sourcetype="zeek:ssl:json"
22
description: customer specific splunk configurations(eg- index, source, sourcetype).
33
Replace the macro definition with configurations for your Splunk Environment.
44
name: zeek_ssl

0 commit comments

Comments
 (0)