Skip to content
This repository was archived by the owner on Dec 14, 2024. It is now read-only.

Commit

Permalink
chore(release): 7.0.0
Browse files Browse the repository at this point in the history
## [7.0.0](v6.6.1...v7.0.0) (2021-05-14)

### Features

* **addon:** PAN Quality Validation and Improvement
* **addon:** Significantly improve and modernize CIM compliance
* **app/addon:** Add Cortex XDR incident support to App and Add-on including new XDR Incidents dashboard - #166

### Bug Fixes

* **addon:** Fix error from Minemeld automatic lookup
* **addon:** Fix src_user field contained destination user - #186

### Performance Improvements

* **app:** Remove high cardinality fields from datamodel

### ⚠ MAJOR RELEASE CHANGES

This is a major release

Splunk dashboards and searches you have created might be
affected by these changes. Please be prepared to test and
adjust any dashboards not included with the App after upgrade.

* **addon:** pan_traffic_start logs no longer included in CIM
* **addon:** pan_traffic_end logs moved from Network Session to Network Traffic datamodel
* **addon:** pan_threat event type now includes wildfire and data logs
* **addon:** pan_file logs moved from Web to IDS datamodel
* **addon:** pan_virus logs moved from Malware to IDS datamodel
* **addon:** pan_wildfire logs moved from Malware to IDS datamodel
* **addon:** pan_email removed from Email datamodel
* **app:** Removes datamodel for GlobalProtect logs before PAN-OS 9.1
* **app/addon:** Removes Traps 4 support
* **app/addon:** Deprecates Traps 5 and Traps 6 support
* **app:** Removes support for legacy WildFire Report API
* **app/addon:** Requires Splunk 8.0 or higher
* **app/addon:** Replaces Adversary Scoreboard and Incident Feed dashboards with new XDR Incidents dashboard
  • Loading branch information
semantic-release-bot committed May 14, 2021
1 parent 75f437c commit 7438d5f
Show file tree
Hide file tree
Showing 6 changed files with 10 additions and 10 deletions.
2 changes: 1 addition & 1 deletion Splunk_TA_paloalto/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ Palo Alto Networks Add-on for Splunk

* **Add-on Homepage:** https://splunkbase.splunk.com/app/2757
* **Authors:** Brian Torres-Gil, Paul Nguyen, Garfield Freeman - Palo Alto Networks
* **Add-on Version:** 6.6.1
* **Add-on Version:** 7.0.0

### Description ###

Expand Down
2 changes: 1 addition & 1 deletion Splunk_TA_paloalto/app.manifest
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
"id": {
"group": null,
"name": "Splunk_TA_paloalto",
"version": "6.6.1"
"version": "7.0.0"
},
"author": [
{
Expand Down
4 changes: 2 additions & 2 deletions Splunk_TA_paloalto/default/app.conf
Original file line number Diff line number Diff line change
@@ -1,13 +1,13 @@
[install]
is_configured = false
state = enabled
build = 822004064
build = 843493495
splunk_supported = 8.1,8.0
cim_supported = 4.x

[launcher]
author = Palo Alto Networks
version = 6.6.1
version = 7.0.0
description = The Palo Alto Networks Add-on allows a Splunk Enterprise administrator to collect data from Palo Alto Networks Next-Generation Firewall devices, Panorama, Advanced Endpoint Protection, Aperture SaaS Security, AutoFocus Threat Intelligence, and MineMeld.

[ui]
Expand Down
4 changes: 2 additions & 2 deletions SplunkforPaloAltoNetworks/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,8 +4,8 @@ Palo Alto Networks App for Splunk

* **App Homepage:** https://splunkbase.splunk.com/app/491
* **Authors:** Brian Torres-Gil, Paul Nguyen, Garfield Freeman - Palo Alto Networks
* **App Version:** 6.6.1
* **Required Add-on (TA) Version:** Splunk_TA_paloalto 6.6.1
* **App Version:** 7.0.0
* **Required Add-on (TA) Version:** Splunk_TA_paloalto 7.0.0

### Description ###

Expand Down
2 changes: 1 addition & 1 deletion SplunkforPaloAltoNetworks/app.manifest
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@
"id": {
"group": null,
"name": "SplunkforPaloAltoNetworks",
"version": "6.6.1"
"version": "7.0.0"
},
"author": [
{
Expand Down
6 changes: 3 additions & 3 deletions SplunkforPaloAltoNetworks/default/app.conf
Original file line number Diff line number Diff line change
Expand Up @@ -5,13 +5,13 @@ label = Palo Alto Networks
[launcher]
author = splunkapp@paloaltonetworks.com
description = The Palo Alto Networks App for Splunk is a set of reports and dashboards which provide visibility into the Palo Alto Networks Next-generation Firewall, Panorama, and Advanced Endpoint Security logs.
version = 6.6.1
version = 7.0.0

[package]
id = SplunkforPaloAltoNetworks

[install]
build = 822004064
ta_dependency_version = 6.6.1
build = 843493495
ta_dependency_version = 7.0.0
splunk_supported = 8.1,8.0
cim_supported = 4.x

0 comments on commit 7438d5f

Please sign in to comment.