Skip to content

Commit

Permalink
Fix merge conflict (elastic#90)
Browse files Browse the repository at this point in the history
  • Loading branch information
narcher7 authored Aug 3, 2020
1 parent 3a2526c commit b1fc7e9
Show file tree
Hide file tree
Showing 12 changed files with 8 additions and 17 deletions.
1 change: 0 additions & 1 deletion docs/agent/agent.asciidoc

This file was deleted.

9 changes: 0 additions & 9 deletions docs/data-visibility/data-visibility.asciidoc

This file was deleted.

File renamed without changes.
File renamed without changes.
Empty file added docs/hosts/index.asciidoc
Empty file.
File renamed without changes
File renamed without changes
File renamed without changes
Empty file.
Empty file added docs/reference/index.asciidoc
Empty file.
12 changes: 6 additions & 6 deletions docs/siem-apis.asciidoc
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
[role="xpack"]
[[security-apis]]
= Elastic Security APIs
== Elastic Security APIs

You can use these APIs to interface with {siem-soln} features:

Expand Down Expand Up @@ -28,15 +28,15 @@ Where:
* `<endpoint>` is the API endpoint, such as `detection_engine/rules` or
`cases/configure`.

If you are making calls to a {kib} space *other than* the `Default` space, the
If you are making calls to a {kib} space *other than* the `Default` space, the
space identifier is part of the endpoint's URL:

`<kibana host>:<port>/s/<space URL>/api/<endpoint>`

Where `<space URL>` is the URL identifier for the {kib} space.

NOTE: You can find space URL identifiers on
{kibana-ref}/xpack-spaces.html[*Edit space*] pages (Management -> Spaces ->
{kibana-ref}/xpack-spaces.html[*Edit space*] pages (Management -> Spaces ->
<space name>) or by calling
{kibana-ref}/spaces-api-get-all.html[`GET /api/spaces/space`].

Expand All @@ -53,7 +53,7 @@ All calls to APIs are stateless. Each call must include all the information {sie

Requests must contain these headers:

* `kbn-xsrf: <value>`, where `<value>` can be any alphanumeric string (for
* `kbn-xsrf: <value>`, where `<value>` can be any alphanumeric string (for
example, `kbn-xsrf: kibana`)
* `Content-Type: application/json` (when the request contains a JSON payload)

Expand All @@ -66,9 +66,9 @@ curl -X GET "<kibana host>:<port>/s/siem/api/detection_engine/rules/_find"
-H 'kbn-xsrf: kibana' -u <username>:<password>
--------------------------------------------------

NOTE: In dev mode, the Kibana server runs behind a proxy which adds a random
NOTE: In dev mode, the Kibana server runs behind a proxy which adds a random
path component to its URL.
{kibana-ref}/development-basepath.html[Considerations for basePath] describes
{kibana-ref}/development-basepath.html[Considerations for basePath] describes
how to work with and disable the random path component.

include::siem/detections/api/det-api-index.asciidoc[]
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -75,4 +75,5 @@ the ECS fields listed in each job description.
NOTE: Some jobs use fields that are not ECS-compliant. These jobs are only
available when you use {beats} to ship data.

include::{stack-docs-root}/docs/en/stack/ml/anomaly-detection/ootb-ml-jobs-siem.asciidoc[tag=siem-jobs]
include::{ml-dir}/anomaly-detection/ootb-ml-jobs-siem.asciidoc[tag=siem-jobs]

0 comments on commit b1fc7e9

Please sign in to comment.