Spaces method and path for this operation:
post /s/{space_id}/api/attack_discovery/_bulk
Refer to Spaces for more information.
Performs bulk updates on multiple Attack discoveries, including workflow status changes and visibility settings. This endpoint allows efficient batch processing of alert modifications without requiring individual API calls for each alert.
POST
/api/attack_discovery/_bulk
curl \
--request POST 'http://localhost:5601/api/attack_discovery/_bulk' \
--header "Authorization: $API_KEY" \
--header "Content-Type: application/json" \
--data-raw '{
"update": {
"ids": [
"c0c8a8bbb4a6561856a974ee9e461f0c82e673a1f0d83f86c5a8d80fc8de4c4f",
"5aa8f2900c0b03854b3b1a52a19558c5ea9893865c78235d4ad3dcc46196f4c7"
],
"kibana_alert_workflow_status": "acknowledged"
}
}'
Request example
{
"update": {
"enable_field_rendering": false,
"ids": [
"c0c8a8bbb4a6561856a974ee9e461f0c82e673a1f0d83f86c5a8d80fc8de4c4f",
"5aa8f2900c0b03854b3b1a52a19558c5ea9893865c78235d4ad3dcc46196f4c7"
],
"kibana_alert_workflow_status": "acknowledged",
"with_replacements": true
}
}
Response examples (200)
{
"data": [
{
"alert_ids": [
"alert-abc-1"
],
"alert_workflow_status": "acknowledged",
"connector_id": "gen-ai-connector",
"connector_name": "OpenAI GPT-4",
"details_markdown": "- **Host** `workstation-01` showed credential access patterns consistent with mimikatz.",
"generation_uuid": "550e8400-e29b-41d4-a716-446655440000",
"id": "c0c8a8bbb4a6561856a974ee9e461f0c82e673a1f0d83f86c5a8d80fc8de4c4f",
"summary_markdown": "A user account was compromised using mimikatz to dump credentials.",
"timestamp": "2024-01-15T10:00:00.000Z",
"title": "Credential theft via mimikatz"
}
]
}
Response examples (400)
{
"error": "Bad Request",
"message": "Invalid request parameters.",
"status_code": 400
}