Ei kuvausta

trigger-shuffle-workflow.sh 678B

12345678910111213141516171819
  1. #!/usr/bin/env bash
  2. set -euo pipefail
  3. WORKFLOW_ID="${1:-}"
  4. IOC_TYPE="${2:-domain}"
  5. IOC_VALUE="${3:-malicious.example}"
  6. if [[ -z "${WORKFLOW_ID}" ]]; then
  7. echo "usage: $0 <workflow_id> [ioc_type] [ioc_value]"
  8. echo "example: $0 123e4567-e89b-12d3-a456-426614174000 domain malicious.example"
  9. exit 1
  10. fi
  11. curl -sS -X POST "http://localhost:8088/action/trigger-shuffle" \
  12. -H "Content-Type: application/json" \
  13. -d "{\"workflow_id\":\"${WORKFLOW_ID}\",\"execution_argument\":{\"ioc_type\":\"${IOC_TYPE}\",\"ioc_value\":\"${IOC_VALUE}\",\"source_event\":{\"event_id\":\"cli-$(date +%s)\",\"asset\":{\"hostname\":\"fw01\"},\"network\":{\"src_ip\":\"198.51.100.25\"}}}}"
  14. echo