From 15caa2ef2677c4b235e578b023d9c4dd7071af19 Mon Sep 17 00:00:00 2001 From: Marius Iversen Date: Tue, 20 Apr 2021 20:50:57 +0200 Subject: [PATCH] update docs typo --- filebeat/docs/modules/threatintel.asciidoc | 5 +++-- x-pack/filebeat/module/threatintel/_meta/docs.asciidoc | 5 +++-- 2 files changed, 6 insertions(+), 4 deletions(-) diff --git a/filebeat/docs/modules/threatintel.asciidoc b/filebeat/docs/modules/threatintel.asciidoc index 08ae5066298..ca57836da1f 100644 --- a/filebeat/docs/modules/threatintel.asciidoc +++ b/filebeat/docs/modules/threatintel.asciidoc @@ -20,8 +20,8 @@ Processors]. The related threat intel attribute that is meant to be used for matching incoming source data is stored under the `threatintel.indicator.*` fields. -======= -The available filesets are: +[float] +=== The available filesets are: * `abuseurl`: Supports gathering URL entities from Abuse.ch. * `abusemalware`: Supports gathering Malware/Payload entities from Abuse.ch. @@ -29,6 +29,7 @@ The available filesets are: * `malwarebazaar`: Supports gathering Malware/Payload entities from Malware Bazaar. * `otx`: Supports gathering threat intel attributes from AlientVault OTX. * `anomali`: Supports gathering threat intel attributes from Anomali. + include::../include/gs-link.asciidoc[] [float] diff --git a/x-pack/filebeat/module/threatintel/_meta/docs.asciidoc b/x-pack/filebeat/module/threatintel/_meta/docs.asciidoc index b273567bb7b..ffe41855e1b 100644 --- a/x-pack/filebeat/module/threatintel/_meta/docs.asciidoc +++ b/x-pack/filebeat/module/threatintel/_meta/docs.asciidoc @@ -15,8 +15,8 @@ Processors]. The related threat intel attribute that is meant to be used for matching incoming source data is stored under the `threatintel.indicator.*` fields. -======= -The available filesets are: +[float] +=== The available filesets are: * `abuseurl`: Supports gathering URL entities from Abuse.ch. * `abusemalware`: Supports gathering Malware/Payload entities from Abuse.ch. @@ -24,6 +24,7 @@ The available filesets are: * `malwarebazaar`: Supports gathering Malware/Payload entities from Malware Bazaar. * `otx`: Supports gathering threat intel attributes from AlientVault OTX. * `anomali`: Supports gathering threat intel attributes from Anomali. + include::../include/gs-link.asciidoc[] [float]