Get a single Attack Discovery generation, including its discoveries and (optional) generation metadata
Spaces method and path for this operation:
Refer to Spaces for more information.
Returns a specific Attack Discovery generation, including all generated Attack discoveries and associated metadata, including execution status and statistics.
Path parameters
-
The unique identifier for the Attack Discovery generation execution. This UUID is returned at the start of an Attack Discovery generation.
Minimum length is
1.
Query parameters
-
Enables a markdown syntax used to render pivot fields, for example
{{ user.name james }}. When disabled, the same example would be rendered asjames. This is primarily used for Attack Discovery views within Kibana. Defaults tofalse.Default value is
false. -
When true, return the created Attack discoveries with text replacements applied to the detailsMarkdown, entitySummaryMarkdown, summaryMarkdown, and title fields. Defaults to
true.Default value is
true.
curl \
--request GET 'http://localhost:5601/api/attack_discovery/generations/2e13f386-46cf-4d65-9e2b-68609e132ba5' \
--header "Authorization: $API_KEY" \
--header "Content-Type: application/json"
{
"data": [
{
"id": "c0c8a8bbb4a6561856a974ee9e461f0c82e673a1f0d83f86c5a8d80fc8de4c4f",
"title": "Suspicious process execution on host-01"
}
],
"generation": {
"alerts_context_count": 50,
"discoveries": 1,
"end": "2025-09-29T06:42:44.810Z",
"execution_uuid": "2e13f386-46cf-4d65-9e2b-68609e132ba5",
"start": "2025-09-29T06:42:08.962Z",
"status": "succeeded"
}
}
{
"error": "Bad Request",
"message": "Invalid request parameters.",
"status_code": 400
}