Skip to content

Conversation

@CTIBurn0ut
Copy link

The current OpenCTI Add-on for Splunk primarily functions within Splunk Cloud environments but lacks native support for modular inputs on Splunk Cloud, which restricts the ability to fetch OpenCTI threat intelligence data directly.

** This was rebuilt using the Splunk Add-on Builder
Added input_type field to the inputs.conf.spec file
Added logic to the input module to handle the new input_type field
copied alert actions and alert actions conf spec files

Dev Splunk instance (Add-on Builder):
https://splunk.dev.filigran.io:8000/en-US/app/splunk_app_addon-builder/tab_home?view=main

Dev Splunk App Install:
https://splunk.dev.filigran.io:8000/en-US/app/TA-opencti-add-on/inputs

This also includes searches that will populate the KV Stores

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants