You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
-d, --directory DIRECTORY Recursively load rules from a directory
478
458
-id, --rule-id TEXT
459
+
-nt, --no-tactic-filename Allow rule filenames without tactic prefix. Use this if rules have been exported with this flag.
479
460
-r, --replace-id Replace rule IDs with new IDs before export
480
461
-h, --help Show this message and exit.
481
462
```
@@ -484,6 +465,8 @@ Options:
484
465
485
466
This command should be run with the `CUSTOM_RULES_DIR` envvar set, that way proper validation is applied to versioning when the rules are downloaded. See the [custom rules docs](docs-dev/custom-rules-management.md) for more information.
486
467
468
+
Note: This command can be used for exporting pre-built, customized pre-built, and custom rules. By default, all rules will be exported. Use the `-cro` flag to only export custom rules, or the `-eq` flag to filter by query.
-s, --skip-errors Skip errors when exporting rules
524
502
-sv, --strip-version Strip the version fields from all rules
525
503
-nt, --no-tactic-filename Exclude tactic prefix in exported filenames for rules. Use same flag for import-rules to prevent warnings and disable its unit test.
504
+
-lc, --local-creation-date Preserve the local creation date of the rule
505
+
-lu, --local-updated-date Preserve the local updated date of the rule
506
+
-cro, --custom-rules-only Only export custom rules
507
+
-eq, --export-query TEXT Apply a query filter to exporting rules e.g. "alert.attributes.tags: \"test\"" to filter for rules that have the tag "test"
Copy file name to clipboardExpand all lines: pyproject.toml
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
[project]
2
2
name = "detection_rules"
3
-
version = "1.2.13"
3
+
version = "1.2.15"
4
4
description = "Detection Rules is the home for rules used by Elastic Security. This repository is used for the development, maintenance, testing, validation, and release of rules for Elastic Security’s Detection Engine."
0 commit comments