centOS 7.x tested
Splunk 7.3.1/8.0.2 tested but should run basically on 6.0+ and higher.
Create an index
Set index on inputs.conf and macros.conf
Install on Universal Forwarders, restart
Install on Heavy Forwarders, restart.
Install on Indexers, restart.
Install on Search heads, restart.
March 13 2020 20:26:47 app=eicar signature=1584145607 dest_ip=192.168.205.130 dest_file=EICAR.test.malware.1584145607 dest_dir=/usr/share dest=splunkui.contoso.local object=file object_type=file user=root vendor=eicar product="Malware Test App for Splunk" vendor_message="This script created a malware test string that should make a change on your filesystem that your antimalware solution believe there is an attack"
3.13.2020.1 - daniel, initial version
Splunk AppInspect evaluates Splunk apps against a set of Splunk-defined criteria to assess the validity and security of an app package and components.
As a Splunkbase app developer, you will have access to all Splunk development resources and receive a 10GB license to build an app that will help solve use cases for customers all over the world. Splunkbase has 1000+ apps and add-ons from Splunk, our partners and our community. Find an app or add-on for most any data source and user need, or simply create your own with help from our developer portal.