Documentation: User Guide
Resilient Web Page: https://www.ibm.com/security/intelligent-orchestration/resilient
Easy Incident Mapping: Enables mapping of static values or search result tokens into Resilient incident fields. You can map fields parsed from the event in the alert or notable event directly into any incident field. You also have custom incident mapping rules for each saved alert or notable event.
Create Artifacts: Maps result tokens into artifacts at the same time the incident mapping is defined.
Custom Field Discovery: Retrieves the incident definition from the Resilient platform so that all defined fields and field values are catalogued inside Splunk or Splunk ES. This allows you to add custom fields to the Resilient platform, which are then available for mapping in Splunk or Splunk ES.
For additional support, go to https://ibm.com/mysupport. Including relevant information from the log files will help us resolve your issue.
Support multiple escalations within single trigger window.
Modified the message post to Splunk Server when the login to Resilient server throws an exception.
Updated README.md about dependency on CIM.
Version 1.0 Jan. 18th, 2018
This release supports Splunk and Splunk ES. It supersedes the previous V25.0.5 release of the Add-On, which supported Splunk only. The version number is 1.0 to reflect that this is a new app, where the previous Splunk Add-On releases used the Resilient Platform version as the version number.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.