Skip to content

Commit e2ee421

Browse files
committed
Removed dependency to Sysmon pipeline
1 parent d287444 commit e2ee421

File tree

2 files changed

+4
-7
lines changed

2 files changed

+4
-7
lines changed

pyproject.toml

-2
Original file line numberDiff line numberDiff line change
@@ -12,12 +12,10 @@ packages = [
1212
[tool.poetry.dependencies]
1313
python = "^3.8"
1414
pysigma = "^0.9.0"
15-
pysigma-pipeline-sysmon = "^1.0.0"
1615

1716
[tool.poetry.dev-dependencies]
1817
pytest = "^6.2.2"
1918
pytest-cov = "^2.11.1"
20-
pysigma-pipeline-sysmon = "^1.0.0"
2119

2220
[build-system]
2321
requires = ["poetry-core>=1.0.0"]

tests/test_splunk_pipelines.py

+4-5
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,6 @@
33
from sigma.backends.splunk import SplunkBackend
44
from sigma.pipelines.splunk import splunk_windows_pipeline, splunk_windows_sysmon_acceleration_keywords, splunk_cim_data_model
55
from sigma.pipelines.common import windows_logsource_mapping
6-
from sigma.pipelines.sysmon import sysmon_pipeline
76
from sigma.exceptions import SigmaTransformationError
87

98
@pytest.mark.parametrize(
@@ -46,7 +45,7 @@ def test_splunk_windows_pipeline_simple(service, source):
4645
)) + ") EventCode=123 field=\"value\""]
4746

4847
def test_splunk_sysmon_process_creation_keyword_acceleration():
49-
assert SplunkBackend(processing_pipeline=sysmon_pipeline() + splunk_windows_pipeline() + splunk_windows_sysmon_acceleration_keywords()).convert(
48+
assert SplunkBackend(processing_pipeline=splunk_windows_pipeline() + splunk_windows_sysmon_acceleration_keywords()).convert(
5049
SigmaCollection.from_yaml(f"""
5150
title: Test
5251
status: test
@@ -59,10 +58,10 @@ def test_splunk_sysmon_process_creation_keyword_acceleration():
5958
field: value
6059
condition: sel
6160
""")
62-
) == ['"ParentProcessGuid" source="WinEventLog:Microsoft-Windows-Sysmon/Operational" EventCode=1 field="value"']
61+
)[0].startswith('"ParentProcessGuid"')
6362

6463
def test_splunk_sysmon_file_creation_keyword_acceleration():
65-
assert SplunkBackend(processing_pipeline=sysmon_pipeline() + splunk_windows_pipeline() + splunk_windows_sysmon_acceleration_keywords()).convert(
64+
assert SplunkBackend(processing_pipeline=splunk_windows_pipeline() + splunk_windows_sysmon_acceleration_keywords()).convert(
6665
SigmaCollection.from_yaml(f"""
6766
title: Test
6867
status: test
@@ -75,7 +74,7 @@ def test_splunk_sysmon_file_creation_keyword_acceleration():
7574
field: value
7675
condition: sel
7776
""")
78-
) == ['"TargetFilename" source="WinEventLog:Microsoft-Windows-Sysmon/Operational" EventCode=11 field="value"']
77+
)[0].startswith('"TargetFilename"')
7978

8079
def test_splunk_process_creation_dm():
8180
assert SplunkBackend(processing_pipeline=splunk_cim_data_model()).convert(

0 commit comments

Comments
 (0)