-
Notifications
You must be signed in to change notification settings - Fork 387
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
auditd_sourcetype_update #3136
auditd_sourcetype_update #3136
Conversation
looks like unit testing is failing on all the detections affected by this change :( will need to debug locally! |
Updated the sourcetype, version and date of all detections to auditd. However, can you check @tccontre is we still need those |
noted. agree I need to check first again this auditd source type if it really parses the fields correctly now and update also other detections. |
will close this one since most of the detections that uses PROCTILE and EXECVE needs a new attackdata and updated detection searches. |
update sourcetype of auditd data sources base on [Splunk add-on for unix and linux].
DONT MERGE THIS PR UNTIL WE RECEIVE THE UPDATED VERSION OF THE APP.
What does this PR have in it? Screenshots are worth 1000 words 😄
Checklist
<platform>_<mitre att&ck technique>_<short description>
nomenclatureNotes For Submitters and Reviewers
build
CI job when it fails will likely show an error about what is failing. You may have a very descriptive error of the specific field(s) in the specific file(s) that is causing an issue. In some cases, its also possible there is an issue with the YAML. Many of these can be caught with the pre-commit hooks if you set them up. These errors will be less descriptive as to what exactly is wrong, but will give you a column and row position in a specific file where the YAML processing breaks. If you're having trouble with this, feel free to add a comment to your PR tagging one of the maintainers and we'll be happy to help troubleshoot it.