Skip to content

Commit c72c9f6

Browse files
Merge branch 'main' into develop
2 parents 7a121e6 + b947538 commit c72c9f6

38 files changed

+1038
-189
lines changed

.circleci/config.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -71,7 +71,7 @@ orbs:
7171
jobs:
7272
release:
7373
docker:
74-
- image: circleci/node:11
74+
- image: circleci/node:12
7575
steps:
7676
- checkout
7777
- run: npx semantic-release

.github/dependabot.yml

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
##
2+
## SPDX-FileCopyrightText: 2020 Splunk, Inc. <[email protected]>
3+
## SPDX-License-Identifier: LicenseRef-Splunk-1-2020
4+
##
5+
##
6+
version: 2
7+
updates:
8+
# Keep package.json (& lockfiles) up to date as soon as
9+
# new versions are published to the npm registry
10+
- package-ecosystem: "gitsubmodule"
11+
directory: "/"
12+
schedule:
13+
interval: "daily"
14+
# Keep Dockerfile up to date, batching pull requests weekly
15+
- package-ecosystem: "pip"
16+
directory: "/"
17+
schedule:
18+
interval: "daily"
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
{
2+
"signedContributors": [
3+
{
4+
"name": "pszkamruk-splunk",
5+
"id": 75434853,
6+
"comment_id": 762698833,
7+
"created_at": "2021-01-19T08:56:57Z",
8+
"repoId": 237108761,
9+
"pullRequestNo": 239
10+
},
11+
{
12+
"name": "uoboda-splunk",
13+
"id": 76950960,
14+
"comment_id": 766894862,
15+
"created_at": "2021-01-25T15:26:50Z",
16+
"repoId": 237108761,
17+
"pullRequestNo": 243
18+
},
19+
{
20+
"name": "kkania-splunk",
21+
"id": 76955023,
22+
"comment_id": 769724633,
23+
"created_at": "2021-01-29T10:37:05Z",
24+
"repoId": 237108761,
25+
"pullRequestNo": 251
26+
},
27+
{
28+
"name": "rajkarkar-crest",
29+
"id": 69803383,
30+
"comment_id": 770676856,
31+
"created_at": "2021-02-01T08:37:13Z",
32+
"repoId": 237108761,
33+
"pullRequestNo": 253
34+
}
35+
]
36+
}

.github/workflows/release-notes.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ jobs:
1515
git fetch --prune --unshallow --tags
1616
- uses: snyk/[email protected]
1717
with:
18-
releaseBranch: master
18+
releaseBranch: main
1919
env:
2020
GITHUB_PR_USERNAME: ${{ github.actor }}
2121
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}

Dockerfile.uf

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,7 @@
1+
ARG SPLUNK_VERSION=latest
2+
FROM splunk/universalforwarder:$SPLUNK_VERSION
3+
ARG SPLUNK_VERSION=latest
4+
ARG SPLUNK_APP_ID=TA_UNKNOWN
5+
ARG SPLUNK_APP_PACKAGE=package
6+
RUN echo ${SPLUNK_VERSION} $SPLUNK_APP_PACKAGE
7+
COPY ${SPLUNK_APP_PACKAGE} /opt/splunkforwarder/etc/apps/${SPLUNK_APP_ID}

docker-compose.yml

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -63,7 +63,27 @@ services:
6363
- SPLUNK_PASSWORD=${SPLUNK_PASSWORD}
6464
- SPLUNK_START_ARGS=--accept-license
6565
- SPLUNK_HEC_TOKEN=${SPLUNK_HEC_TOKEN}
66-
66+
67+
uf:
68+
build:
69+
context: .
70+
dockerfile: Dockerfile.uf
71+
args:
72+
SPLUNK_APP_ID: ${SPLUNK_APP_ID}
73+
SPLUNK_APP_PACKAGE: ${SPLUNK_APP_PACKAGE}
74+
SPLUNK_VERSION: ${SPLUNK_VERSION}
75+
hostname: uf
76+
ports:
77+
- "9997"
78+
- "8089"
79+
links:
80+
- splunk
81+
environment:
82+
- SPLUNK_PASSWORD=Chang3d!
83+
- SPLUNK_START_ARGS=--accept-license
84+
volumes:
85+
- ${CURRENT_DIR}/uf_files:${CURRENT_DIR}/uf_files
86+
6787
volumes:
6888
splunk-sc4s-var:
6989
external: false

docs/api_reference/addon_parser.rst

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,3 +34,9 @@ TransformsParser
3434
.. automodule:: standard_lib.addon_parser.transforms_parser
3535
:members:
3636
:show-inheritance:
37+
38+
SavedsearchesParser
39+
~~~~~~~~~~~~~~~~~~~
40+
.. automodule:: standard_lib.addon_parser.savedsearches_parser
41+
:members:
42+
:show-inheritance:

docs/api_reference/event_ingestion.rst

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,5 +16,11 @@ HEC Raw Ingestor
1616
SC4S Event Ingestor
1717
~~~~~~~~~~~~~~~~~~~~
1818
.. automodule:: standard_lib.event_ingestors.sc4s_event_ingestor
19+
:members:
20+
:show-inheritance:
21+
22+
File Monitor Ingestor
23+
~~~~~~~~~~~~~~~~~~~~~
24+
.. automodule:: standard_lib.event_ingestors.file_monitor_ingestor
1925
:members:
2026
:show-inheritance:

docs/cim_tests.rst

Lines changed: 4 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ Overview
77
The CIM tests are written with a purpose of testing the compatibility of the add-on with CIM Data Models (Based on Splunk_SA_CIM 4.15.0).
88
An add-on is said to be CIM compatible if it fulfils the following two criteria:
99

10-
1. The add-on extracts all the fields with valid values, which are marked as required by the `Data Model Definitions <https://github.com/splunk/pytest-splunk-addon/tree/master/pytest_splunk_addon/standard_lib/data_models>`_.
10+
1. The add-on extracts all the fields with valid values, which are marked as required by the `Data Model Definitions <https://github.com/splunk/pytest-splunk-addon/tree/main/pytest_splunk_addon/standard_lib/data_models>`_.
1111
2. Any event for the add-on is not mapped with more than one data model.
1212

1313
---------------------
@@ -34,7 +34,7 @@ Test Scenarios
3434
**Workflow:**
3535

3636
* Plugin parses tags.conf to get a list of tags for each eventtype.
37-
* Plugin parses all the `supported datamodels <https://github.com/splunk/pytest-splunk-addon/tree/master/pytest_splunk_addon/standard_lib/data_models>`_.
37+
* Plugin parses all the `supported datamodels <https://github.com/splunk/pytest-splunk-addon/tree/main/pytest_splunk_addon/standard_lib/data_models>`_.
3838
* Then it gets a list of the datasets mapped with an eventtype.
3939
* Generates test case for each eventtype.
4040

@@ -80,11 +80,11 @@ Test Scenarios
8080

8181
**Workflow:**
8282

83-
* Plugin collects the list of not_allowed_in_search fields from mapped datasets and `CommonFields.json <https://github.com/splunk/pytest-splunk-addon/blob/master/pytest_splunk_addon/standard_lib/cim_tests/CommonFields.json>`_.
83+
* Plugin collects the list of not_allowed_in_search fields from mapped datasets and `CommonFields.json <https://github.com/splunk/pytest-splunk-addon/blob/main/pytest_splunk_addon/standard_lib/cim_tests/CommonFields.json>`_.
8484
* Using search query the test case verifies if not_allowed_in_search fields are populated in search or not.
8585

8686
.. note::
87-
`CommonFields.json <https://github.com/splunk/pytest-splunk-addon/blob/master/pytest_splunk_addon/standard_lib/cim_tests/CommonFields.json>`_ contains fields which are automatically provided by asset and identity correlation features of applications like Splunk Enterprise Security.
87+
`CommonFields.json <https://github.com/splunk/pytest-splunk-addon/blob/main/pytest_splunk_addon/standard_lib/cim_tests/CommonFields.json>`_ contains fields which are automatically provided by asset and identity correlation features of applications like Splunk Enterprise Security.
8888

8989
**4. Testcase for all not_allowed_in_props fields**
9090

@@ -118,7 +118,6 @@ In case of test case failure check if:
118118

119119
- The add-on to be tested is installed on the Splunk instance.
120120
- Data is generated sufficiently for the addon being tested.
121-
- Splunk_SA_CIM is installed on the Splunk instance.
122121
- Splunk licence has not expired.
123122
- Splunk instance is up and running.
124123
- Splunk instance's management port is accessible from the test machine.

0 commit comments

Comments
 (0)