Dev v1.0 - Merged from version 2.0 of OpenCTI add-on #2
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
The current OpenCTI Add-on for Splunk primarily functions within Splunk Cloud environments but lacks native support for modular inputs on Splunk Cloud, which restricts the ability to fetch OpenCTI threat intelligence data directly.
** This was rebuilt using the Splunk Add-on Builder
Added input_type field to the inputs.conf.spec file
Added logic to the input module to handle the new input_type field
copied alert actions and alert actions conf spec files
Dev Splunk instance (Add-on Builder):
https://splunk.dev.filigran.io:8000/en-US/app/splunk_app_addon-builder/tab_home?view=main
Dev Splunk App Install:
https://splunk.dev.filigran.io:8000/en-US/app/TA-opencti-add-on/inputs
This also includes searches that will populate the KV Stores