Skip to content

Automated Splunk TA Update 187 #3361

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Closed
wants to merge 1 commit into from
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
11 changes: 6 additions & 5 deletions contentctl.yml
Original file line number Diff line number Diff line change
Expand Up @@ -143,9 +143,9 @@ apps:
- uid: 1876
title: Splunk Add-on for AWS
appid: Splunk_TA_aws
version: 7.9.0
version: 7.9.1
description: description of app
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-amazon-web-services-aws_790.tgz
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-amazon-web-services-aws_791.tgz
- uid: 3088
title: Splunk Add-on for Google Cloud Platform
appid: SPLUNK_ADD_ON_FOR_GOOGLE_CLOUD_PLATFORM
Expand All @@ -161,9 +161,9 @@ apps:
- uid: 3110
title: Splunk Add-on for Microsoft Cloud Services
appid: SPLUNK_TA_MICROSOFT_CLOUD_SERVICES
version: 5.4.2
version: 5.4.3
description: description of app
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-cloud-services_542.tgz
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-microsoft-cloud-services_543.tgz
- uid: 4055
title: Splunk Add-on for Microsoft Office 365
appid: SPLUNK_ADD_ON_FOR_MICROSOFT_OFFICE_365
Expand Down Expand Up @@ -216,6 +216,7 @@ apps:
title: Splunk Add-on for AppDynamics
appid: Splunk_TA_AppDynamics
version: 3.0.0
description: The Splunk Add-on for AppDynamics enables you to easily configure data inputs to pull data from AppDynamics' REST APIs
description: The Splunk Add-on for AppDynamics enables you to easily configure data
inputs to pull data from AppDynamics' REST APIs
hardcoded_path: https://attack-range-appbinaries.s3.us-west-2.amazonaws.com/splunk-add-on-for-appdynamics_300.tgz
githash: d6fac80e6d50ae06b40f91519a98489d4ce3a3fd
4 changes: 2 additions & 2 deletions data_sources/asl_aws_cloudtrail.yml
Original file line number Diff line number Diff line change
Expand Up @@ -3,11 +3,11 @@ id: 1dcf9cfb-0e91-44c6-81b3-61b2574ec898
version: 1
date: '2025-01-14'
author: Patrick Bareiss, Splunk
description: Data source object for ASL AWS CloudTrail
description: Data source object for ASL AWS CloudTrail
source: aws_asl
sourcetype: aws:asl
separator: api.operation
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
2 changes: 1 addition & 1 deletion data_sources/aws_cloudfront.yml
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ sourcetype: aws:cloudfront:accesslogs
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- action
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,4 +10,4 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_assumerolewithsaml.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- action
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_consolelogin.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- action
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_copyobject.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- additionalEventData.AuthenticationMethod
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_createaccesskey.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- action
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_createkey.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- app
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_createloginprofile.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- action
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_createnetworkaclentry.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- action
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_createpolicyversion.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- action
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_createsnapshot.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- app
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_createtask.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- app
Expand Down
5 changes: 3 additions & 2 deletions data_sources/aws_cloudtrail_createvirtualmfadevice.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- action
Expand Down Expand Up @@ -97,4 +97,5 @@ example_log: '{"eventVersion": "1.08", "userIdentity": {"type": "Root", "princip
"strt_mfa_2"}, "responseElements": {"virtualMFADevice": {"serialNumber": "arn:aws:iam::1111111111111111:mfa/strt_mfa_2"}},
"requestID": "2fbe2074-55f8-4ec6-ad32-0b250803cf46", "eventID": "7e1c493d-c3c3-4f4a-ae4f-8cdd38970027",
"readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId":
"1111111111111111", "eventCategory": "Management", "sessionCredentialFromConsole": "true"}'
"1111111111111111", "eventCategory": "Management", "sessionCredentialFromConsole":
"true"}'
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_deactivatemfadevice.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- action
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- action
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_deletealarms.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- action
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_deletedetector.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- app
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_deletegroup.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- action
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_deleteipset.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- app
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_deleteloggroup.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- apiVersion
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_deletelogstream.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- apiVersion
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_deletenetworkaclentry.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- action
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_deletepolicy.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- action
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_deleterule.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- apiVersion
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_deletesnapshot.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- action
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_deletetrail.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- app
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_deletevirtualmfadevice.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- action
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_deletewebacl.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- apiVersion
Expand Down
6 changes: 3 additions & 3 deletions data_sources/aws_cloudtrail_describeeventaggregates.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- app
Expand Down Expand Up @@ -93,5 +93,5 @@ example_log: '{"eventVersion": "1.08", "userIdentity": {"type": "Root", "princip
"filter": {"eventStatusCodes": ["open", "upcoming"], "startTimes": [{"from": "Jan
25, 2023 2:54:32 AM"}]}}, "responseElements": null, "requestID": "d6adf050-1d7a-4c25-9d48-0319e33f6f9a",
"eventID": "201cee69-61ab-4ffb-80b7-bd31e81e0d82", "readOnly": true, "eventType":
"AwsApiCall", "managementEvent": true, "recipientAccountId": "1111111111111111", "eventCategory":
"Management", "sessionCredentialFromConsole": "true"}'
"AwsApiCall", "managementEvent": true, "recipientAccountId": "1111111111111111",
"eventCategory": "Management", "sessionCredentialFromConsole": "true"}'
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- app
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_getaccountpasswordpolicy.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- action
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_getobject.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- additionalEventData.AuthenticationMethod
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_getpassworddata.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- app
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_jobcreated.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- app
Expand Down
2 changes: 1 addition & 1 deletion data_sources/aws_cloudtrail_modifydbinstance.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- app
Expand Down
12 changes: 6 additions & 6 deletions data_sources/aws_cloudtrail_modifyimageattribute.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ separator: eventName
supported_TA:
- name: Splunk Add-on for AWS
url: https://splunkbase.splunk.com/app/1876
version: 7.9.0
version: 7.9.1
fields:
- _time
- app
Expand Down Expand Up @@ -101,8 +101,8 @@ example_log: '{"eventVersion": "1.08", "userIdentity": {"type": "AssumedRole", "
"ec2.amazonaws.com", "eventName": "ModifyImageAttribute", "awsRegion": "us-west-2",
"sourceIPAddress": "72.135.245.10", "userAgent": "AWS Internal", "requestParameters":
{"imageId": "ami-06dac31db29508566", "launchPermission": {"add": {"items": [{"userId":
"1111111111111111"}]}}, "attributeType": "launchPermission"}, "responseElements": {"requestId":
"84c431ce-6268-4218-aaf8-b4cdc1cd4055", "_return": true}, "requestID": "84c431ce-6268-4218-aaf8-b4cdc1cd4055",
"eventID": "957e1b12-ea17-4006-aefd-20677ace72b8", "readOnly": false, "eventType":
"AwsApiCall", "managementEvent": true, "recipientAccountId": "111111111111", "eventCategory":
"Management", "sessionCredentialFromConsole": "true"}'
"1111111111111111"}]}}, "attributeType": "launchPermission"}, "responseElements":
{"requestId": "84c431ce-6268-4218-aaf8-b4cdc1cd4055", "_return": true}, "requestID":
"84c431ce-6268-4218-aaf8-b4cdc1cd4055", "eventID": "957e1b12-ea17-4006-aefd-20677ace72b8",
"readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId":
"111111111111", "eventCategory": "Management", "sessionCredentialFromConsole": "true"}'
Loading
Loading