You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Tell us about your request. Provide a summary of the request and all versions that are affected.
Data mappings are useless without data. One of the biggest pain points of Security Analytics users is how to ingest data for use in Security Analytics. To quote one common mantra among users, "No data, No SIEM, No Detection."
To resolve this issue, create an end-to-end guide about ingesting data into Security Analytics. In particular:
What APIs, Dashboard elements, or tools, such as Data Prepper or OpenSearch Ingestion Pipelines, can be used to add data to Security Analytics.
How to format and map the data.
How to set up and create detectors based on logs produced on the data. Some of this is documented on the Creating Detectors page.
What do you want to do?
Tell us about your request. Provide a summary of the request and all versions that are affected.
Data mappings are useless without data. One of the biggest pain points of Security Analytics users is how to ingest data for use in Security Analytics. To quote one common mantra among users, "No data, No SIEM, No Detection."
To resolve this issue, create an end-to-end guide about ingesting data into Security Analytics. In particular:
What other resources are available? Provide links to related issues, POCs, steps for testing, etc.
The text was updated successfully, but these errors were encountered: