You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: total_replay/readme.md
+67Lines changed: 67 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -118,6 +118,73 @@ From there, you can choose whether to replay only detection GUIDs, only analytic
118
118
119
119
C. TOTAL-REPLAY downloads the required Attack Data each time you execute or replay data during detection testing or development. To help reduce disk space usage, the tool generates a cached .yml file for every downloaded dataset. You can then use the `local_data_path` parameter to replay the cached data, allowing you to avoid downloading the same Attack Data again.
120
120
121
+
---
122
+
123
+
## Run Detections
124
+
125
+
In addition to replaying attack data, TOTAL-REPLAY includes a detection runner tool (`run_detections.py`) that executes SPL queries from Security Content detection YAML files directly against your Splunk instance and outputs results to a JSONL file.
126
+
127
+
### Environment Variables
128
+
129
+
The detection runner requires the following environment variables (or config file settings):
|`-e, --earliest`| Earliest time for search (default: 0 = all time) |
184
+
|`-l, --latest`| Latest time for search (default: now) |
185
+
186
+
---
187
+
121
188
### Other
122
189
123
190
For replaying captured datasets or event logs during detection development or testing outside of the Splunk Security Content or Splunk Attack Data GitHub repositories, we recommend using the built-in replay.py feature provided by either Splunk Attack Range or Attack Data.
0 commit comments