You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
intelfile:=flag.String("intelfile", "", "The path to a local text file to be added to the threat intelligence database. Must also specify the 'type' of intel using -inteltype as well as the name via -intelname")
51
51
inteltype:=flag.String("inteltype", "", "A string-based identifier that will appear when matches occur - tor, suspicious, proxy, etc - something to identify what type of file we are ingesting. Must also specify the file via -intelfile and name via -intelname.")
52
52
summarizeti:=flag.Bool("summarizeti", false, "Summarize the contents of the ThreatDB, if it exists.")
53
+
tifeeds:=flag.Bool("tifeeds", false, "See all currently ingested Threat Indicator Feeds")
53
54
fullparse:=flag.Bool("fullparse", false, "If specified, will scan entire files for all possible keys to use in CSV rather than generalizing messages into an entire column - increases processing time. Use to expand JSON blobs inside columnar data with -jsoncol to provide the name of the column.")
54
55
updategeo:=flag.Bool("updategeo", false, "Update local MaxMind databases, even if they are detected.")
55
56
passthrough:=flag.Bool("passthrough", false, "Skip all enrichment steps - only perform log conversion to CSV")
0 commit comments