Skip to content

Commit 0b7f09b

Browse files
integrate feedback
1 parent 0dd583b commit 0b7f09b

File tree

1 file changed

+3
-4
lines changed

1 file changed

+3
-4
lines changed

reference/security/fields-and-object-schemas/alert-schema.md

Lines changed: 3 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -42,12 +42,11 @@ The non-ECS fields listed below are beta and subject to change.
4242
| [`client.*`](ecs://reference/ecs-client.md) | ECS `client.*` fields copied from the source document, if present, for custom query and indicator match rules. |
4343
| [`cloud.*`](ecs://reference/ecs-cloud.md) | ECS `cloud.*` fields copied from the source document, if present, for custom query and indicator match rules. |
4444
| [`container.*`](ecs://reference/ecs-container.md) | ECS `container.* fields` copied from the source document, if present, for custom query and indicator match rules. |
45-
| [`data_stream.*`](ecs://reference/ecs-data_stream.md) | ECS `data_stream.*` fields copied from the source document, if present, for custom query and indicator match rules.<br>**Note:** These fields may be constant keywords in the source documents, but are copied into the alert documents as keywords. |
4645
| [`destination.*`](ecs://reference/ecs-destination.md) | ECS `destination.*` fields copied from the source document, if present, for custom query and indicator match rules. |
4746
| [`dll.*`](ecs://reference/ecs-dll.md) | ECS `dll.*` fields copied from the source document, if present, for custom query and indicator match rules. |
4847
| [`dns.*`](ecs://reference/ecs-dns.md) | ECS `dns.*` fields copied from the source document, if present, for custom query and indicator match rules. |
4948
| [`error.*`](ecs://reference/ecs-error.md) | ECS `error.*` fields copied from the source document, if present, for custom query and indicator match rules. |
50-
| [`event.*`](ecs://reference/ecs-event.md) | ECS `event.*` fields copied from the source document, if present, for custom query and indicator match rules.<br>**Note:** categorization fields above (`event.kind`, `event.category`, `event.type`, `event.outcome`) are listed separately above. |
49+
| [`event.*`](ecs://reference/ecs-event.md) | ECS `event.*` fields copied from the source document, if present, for custom query and indicator match rules.<br>**Note:** categorization fields (`event.kind`, `event.category`, `event.type`, `event.outcome`) are listed separately. |
5150
| [`file.*`](ecs://reference/ecs-file.md) | ECS `file.*` fields copied from the source document, if present, for custom query and indicator match rules. |
5251
| [`group.*`](ecs://reference/ecs-group.md) | ECS `group.*` fields copied from the source document, if present, for custom query and indicator match rules. |
5352
| [`host.*`](ecs://reference/ecs-host.md) | ECS `host.*` fields copied from the source document, if present, for custom query and indicator match rules. |
@@ -77,8 +76,8 @@ The non-ECS fields listed below are beta and subject to change.
7776
| `kibana.alert.ancestors.*` | Type: object |
7877
| `kibana.alert.depth` | Type: Long |
7978
| `kibana.alert.new_terms` | The value of the new term that generated this alert.<br>Type: keyword |
80-
| `kibana.alert.original_data_stream.*` {applies_to}`stack: ga 9.1`| Data stream information from the original source event, including `dataset`, `namespace`, and `type` fields.<br>Type: object |
81-
| `kibana.alert.original_event.*` | Type: object |
79+
| `kibana.alert.original_data_stream.*` {applies_to}`stack: ga 9.1`| Data stream information copied from the original source event, including `dataset`, `namespace`, and `type` fields.<br>Type: object |
80+
| `kibana.alert.original_event.*` | Event information copied from the original source event.<br>Type: object |
8281
| `kibana.alert.original_time` | The value copied from the source event (`@timestamp`).<br>Type: date |
8382
| `kibana.alert.reason` | Type: keyword |
8483
| `kibana.alert.rule.author` | The value of the `author` who created the rule. Refer to [configure advanced rule settings](/solutions/security/detect-and-alert/create-detection-rule.md#rule-ui-advanced-params).<br>Type: keyword |

0 commit comments

Comments
 (0)