Skip to content

Commit f7481eb

Browse files
patel-bhavingithub-actions[bot]
authored andcommitted
Updated TAs
1 parent be3ab3c commit f7481eb

File tree

72 files changed

+75
-75
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

72 files changed

+75
-75
lines changed

contentctl.yml

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -137,9 +137,9 @@ apps:
137137
- uid: 1876
138138
title: Splunk Add-on for AWS
139139
appid: Splunk_TA_aws
140-
version: 7.8.0
140+
version: 7.9.0
141141
description: description of app
142-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-amazon-web-services-aws_780.tgz
142+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-amazon-web-services-aws_790.tgz
143143
- uid: 3088
144144
title: Splunk Add-on for Google Cloud Platform
145145
appid: SPLUNK_ADD_ON_FOR_GOOGLE_CLOUD_PLATFORM
@@ -161,9 +161,9 @@ apps:
161161
- uid: 4055
162162
title: Splunk Add-on for Microsoft Office 365
163163
appid: SPLUNK_ADD_ON_FOR_MICROSOFT_OFFICE_365
164-
version: 4.6.0
164+
version: 4.7.0
165165
description: description of app
166-
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-office-365_460.tgz
166+
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-office-365_470.tgz
167167
- uid: 2890
168168
title: Splunk Machine Learning Toolkit
169169
appid: SPLUNK_MACHINE_LEARNING_TOOLKIT

data_sources/aws_cloudfront.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ sourcetype: aws:cloudfront:accesslogs
99
supported_TA:
1010
- name: Splunk Add-on for AWS
1111
url: https://splunkbase.splunk.com/app/1876
12-
version: 7.8.0
12+
version: 7.9.0
1313
fields:
1414
- _time
1515
- action

data_sources/aws_cloudtrail.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,4 +10,4 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.8.0
13+
version: 7.9.0

data_sources/aws_cloudtrail_assumerolewithsaml.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.8.0
13+
version: 7.9.0
1414
fields:
1515
- _time
1616
- action

data_sources/aws_cloudtrail_consolelogin.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.8.0
13+
version: 7.9.0
1414
fields:
1515
- _time
1616
- action

data_sources/aws_cloudtrail_copyobject.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.8.0
13+
version: 7.9.0
1414
fields:
1515
- _time
1616
- additionalEventData.AuthenticationMethod

data_sources/aws_cloudtrail_createaccesskey.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.8.0
13+
version: 7.9.0
1414
fields:
1515
- _time
1616
- action

data_sources/aws_cloudtrail_createkey.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.8.0
13+
version: 7.9.0
1414
fields:
1515
- _time
1616
- app

data_sources/aws_cloudtrail_createloginprofile.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.8.0
13+
version: 7.9.0
1414
fields:
1515
- _time
1616
- action

data_sources/aws_cloudtrail_createnetworkaclentry.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ separator: eventName
1010
supported_TA:
1111
- name: Splunk Add-on for AWS
1212
url: https://splunkbase.splunk.com/app/1876
13-
version: 7.8.0
13+
version: 7.9.0
1414
fields:
1515
- _time
1616
- action

0 commit comments

Comments
 (0)