Skip to content

mnemonic-no/act-splunk

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

43 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

act-splunk

act-splunk is a Splunk Add-on that adds workflow actions and external lookups towards the ACT platform.

The add-on is preconfigured to use an open, read only ACT instance with public data.

Installation

or

  • clone repository and build
./build.sh

Setup

After installation, enter app > act > Set up to enter information on API and WWW hostname to connect to a running ACT instance.

Setup

Features

Workflow actions

Within search result, you will find workflow actions on supported field. When clicking on a workflow action, you will be redirected to the ACT GUI.

Workflow Actions

ACT Search

You can specify a generic search using the act command, to generate events based on an ACT query:

| act [<keyword>] [option=value] [option=value]

Keyword search

The follwoing options can be specified, using option=value to limit the search result.

  • limit (default=25)
  • fact_type
  • fact_value
  • object_type
  • object_value

Search options

ACT annotation

You can use the acta command to annotate existing events with data from an ACT query:

.... | acta field1 [... fieldN] [option=value] [option=value]

ACT annotation

Fields specified will be used as object_value in the search and the search result can be limited by the same options specified in the ACT Search.

actsearch and acta can also be combined to annotate results from the search:

Nested search

About

Splunk App giving access to ACT data

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published