@@ -8,7 +8,7 @@ This script generates the ECS mappings for the Wazuh indices.
8
8
- Python 3.6 or higher
9
9
- jq
10
10
11
- ### Folder structure
11
+ ### Folder structrue
12
12
13
13
There is a folder for each module. Inside each folder, there is a ` fields ` folder with the required
14
14
files to generate the mappings. These are the inputs for the ECS generator.
@@ -62,7 +62,7 @@ curl -u admin:admin -k -X PUT "https://indexer:9200/_index_template/wazuh-vulner
62
62
```
63
63
64
64
Notes:
65
- - PUT and POST are interchangeable .
65
+ - PUT and POST are interchangable .
66
66
- The name of the index template does not matter. Any name can be used.
67
67
- Adjust credentials and URL accordingly.
68
68
@@ -83,7 +83,7 @@ are required.
83
83
84
84
For testing purposes, the script ` generate_events.py ` can be used to generate events for a given module.
85
85
Currently, it is only able to generate events for the ` vulnerability-detector ` module. To support other
86
- modules, please extend or refactor the script.
86
+ modules, please extend of refactor the script.
87
87
88
88
The script prompts for the required parameters, so it can be launched without arguments:
89
89
@@ -95,7 +95,7 @@ The script will generate a JSON file with the events, and will also ask whether
95
95
indexer. If the upload option is selected, the script will ask for the indexer URL and port, credentials,
96
96
and index name.
97
97
98
- The script uses a log file. Check it out for debugging or additional information.
98
+ The script uses log file. Check it out for debugging or additonal information.
99
99
100
100
#### References
101
101
0 commit comments