This add-on is intended to be a Search Command Template with the intent of simplifying setup.xml, creating/managing the password store, and using custom config files.
This are created using parts of the JIRA Alert Add-on created by Splunk. You can clone this project.
- Clone template from Github
- Rename
splunk-template-command
directory to your<newAppName>
. - Update app.conf to setting to reflect your app.
- if you plan on using the credential store for password update the credentials stanza.
- For custom config files rename
customcommand.conf
andcustomcommand.conf.spec
to a relevant name.- Update stanza and setting which you plan to using in your app.
- Rename customcommand.py to reflect your .
- Edit
commands.conf
replace stanza with the name of your custom command and replacefilename
settings with what ever you renameed customcommand.py to. - Update
restmap.conf
the[admin_external:command_install]
to[admin_external:<newAppName>_install]
- Within
<newAppName>.py
from setup 5 search and replacecustomCommand
with<newAppName>
- Replace
customCommand
with<newAppName>
in logging.conf
- Replace
- Within setup.xml
- edit the
endpoint
attribute to reflect the change made in step 7. - edit the
entity
attribute to reflect the stanza define in your custom conf file - edit all
field
attribute to reflect the settings defined in your custom conf file
- edit the
- Edit
install_endpoint.py
to reflect the stanza and setting define insetup.xml
and your custom.conf file.
###Adding Python modules Note: PIP is required and all modules should have no archType.
To add edit the setup.sh.
The Splunk Add-on for Atlassian JIRA Alerts is licensed under the Apache License 2.0. Details can be found in the LICENSE page.