When installing the Secret Server app, all searches filter on sourcetype="SecretServer". To ensure that data is showing up, go to the Data Input that Secret Server is pointed to in Splunk and ensure that it the Source name override is set to "SecretServer'
* Updated to Audit Actions to include all audit types as of Secret Server 10.3.000000.
* Added various reports to app dashboard.
* Added CIM support.
* Added field extractions for mapping to the Common Information Model (CIM).
Fixed issue with conf files incorrectly in the local directory instead of the default directory.
Updated Source Type searches. Now the Syslog Data Input that Splunk is reading Secret Server info from must be named "SecretServer".
Splunk's App Certification program uses a specific set of criteria to evaluate the level of quality, usability and security your app offers to its users. In addition, we evaluate the documentation and support you offer to your app's users.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 50GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.