Get Open Threat Exchange data into Splunk.
This add-on polls the OTX API and indexes pulses, and their related indicators, into Splunk.
You can then use these indicators and pulses you see fit, however if you are a Splunk for Enterprise Security user you should also get the partner app SA-otx, which uses this data and adds threat indicators into the Splunk ES threat collections.
To use this add-on:
Soon after this point you should soon be able to see OTX data by searching:
index=otx sourcetype=otx:pulse
index=otx sourcetype=otx:indicator
Of note:
* The otx:indicator
events contain a pulse_id
, which link it to the id
of a corresponding otx:pulse
.
* The input picks up any modified pulses since last poll, so you may wish to use | dedup id
to limit to the latest reported details of an individual otx:pulse
Update to use new add-on builder libraries
Rewrite using Python 3. Compatible with Splunk 8.x and Splunk Cloud.
You will need to reconfigure your OTX input if you are upgrading from version 1.0.0. Please remove any existing OTX inputs and configure it again from scratch using this new version.
v2.0.1: AppInspect fix
Rewrite using Python 3. Compatible with Splunk 8.x and Splunk Cloud.
You will need to reconfigure your OTX input if you are upgrading from version 1.0.0. Please remove any existing OTX inputs and configure it again from scratch using this new version.
Initial release
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps from Splunk, our partners and our community. Find an app for most any data source and user need, or simply create your own with help from our developer portal.