Raphaël Vinot
Raphaël Vinot
What is the search criteria? Do you want to iterate over all the events and get the threat actor?
No, the empty events aren't exposed to the search. (I'm 99% sure, but @iglocska can surely confirm)
This method is expecting the ID of the sharing group. It is possible to have multiple sharing groups with the same name on a MISP instance, so searching like that...
The events generated by PyMISP work just fine on MISP, so it is probably more an issue with the schema itself.
ok, update on that: PyMISP `to_json` returns a blob that is compatible with what MISP expects (float or int) when the schema says string. We could consider to add a...
Alright, I started to look at that: 1. ~~will require more detailed investigation as it is converted to an integer at a place that makes it somewhat hard to change.~~...
It is a bug on MISP side, that should be handled as a boolean, and not 0/1. It will be fixed in MISP asap.
If that's all your code, it is creating an empty event without even an info field. It is not valid. Also, you're not saving the response of `misp.add_event(event, pythonify=False)` so...
It seems the mysql password in MISP config is incorrect: `'SQLSTATE[HY000] [1045] Access denied for user 'misp'@'localhost' (using password: YES)'`
I just searched "reset MySQL Password" and this link came up, that should help: https://linuxize.com/post/how-to-reset-a-mysql-root-password/