The connector looks for config.yml in the current directory to read configuration.
In case of Docker container usage, the "current directory" is /app.
Optionally, many of the configuration settings can be handled solely by environment variables as described in the table below. This can be helpful to spin up a quick container to only specify what you need, beyond the defaults.
Configuration parameters
YAML Parameter |
Environment Variable |
Mandatory |
Description |
|---|---|---|---|
|
|
Yes |
The URL of the OpenCTI Platform. |
|
|
Yes |
Access token to the OpenCTI Platform. |
|
|
No |
Whether to use TLS certificate validation for connection with the OpenCTI Platform. Default: |
|
|
Yes |
Unique identifier for the connector in form of UUIDv4 value. |
|
|
No |
Name of the connector to identify it in OpenCTI Platform. Default: |
|
|
No |
Scope of the connector. Default: |
|
|
No |
The default confidence level for created objects (a number between 0 and 100). Default: |
|
|
No |
The log level for the connector, can be Default: |
|
|
No |
Whether to update data for the stix2 objects that already exist in the OpenCTI Platform. Default: |
|
|
No |
API Root of the Kaspersky Threat Intelligence Portal TAXII server. Default: |
|
|
Yes |
Access token to the Kaspersky Threat Intelligence Portal TAXII server. |
|
|
No |
Whether to use TLS certificate validation for connection with the Kaspersky Threat Intelligence Portal TAXII server. Default: |
|
|
No |
The offset (in seconds) from the current time to the past, defining the start point for data import. Default: |
|
|
No |
Interval (in seconds) between updates execution. Default: |
|
|
No |
Whether to generate additional stix2 objects based on analysis of indicator's description content. Default: |
|
|
No |
List of collections to import from TAXII server. Both UID and alias (with wildcards) can be used to specify collection. Default: |
It is not recommended to use too large a value for the kaspersky.initial_history configuration parameter, because it may result in a large amount of data being received from а TAXII server.
We strongly recommend that you keep the true value for the opencti.ssl_verify and kaspersky.ssl_verify parameters . If the false value for these parameters is specified, the connector will accept any TLS certificate presented by the server and will ignore hostname mismatches and/or expired certificates, which will make your application vulnerable to man-in-the-middle (MitM) attacks.
Starting from OpenCTI version 6.0, the connector.confidence_level parameter has been deprecated.