When searching for sourcetype=recorded future IOCS, i receive the following error. I updated the API key and that fixed the issue of not being able to authenticate but now I am receiving this error. Is there somewhere within the config i need to stop the script from being started via Command line?
No session key was provided by the Splunk server. This can happen if the script is started from the command line which is not supported.
Traceback (most recent call last):
File "/opt/splunk/etc/apps/TA-recordedfuture/bin/get-rf-threatlists.py", line 186, in main
sessionkey = rfsplunk.apikey.getsessionkey()
File "/opt/splunk/etc/apps/TA-recordedfuture/bin/rfsplunk/apikey.py", line 85, in getsession_key
raise MissingSessionKeyError('No session key was provided by the '
MissingSessionKeyError: No session key was provided by the Splunk server. This can happen if the script is started from the command line which is not supported.
... View more
Searching: index=sec_windows source=wineventlog:security EventCode=4776 action=failure
should return a field called Error_Code which signifies the error encountered by the authenticating user. This field parses "-" for everything which is incorrect. I have tried to use field extractor, but that still hasn't worked. I don't know why.
If I extract the field "inline":
| rex field=Message "Error\sCode:\s+(?0[^\s]+)"
it works but there are way too many events to do this
... View more