diff --git a/x-pack/plugins/security_solution/server/lib/detection_engine/scripts/find_alerting_rules.sh b/x-pack/plugins/security_solution/server/lib/detection_engine/scripts/find_alerting_rules.sh index 3d89814a5810f..c735dd333710c 100755 --- a/x-pack/plugins/security_solution/server/lib/detection_engine/scripts/find_alerting_rules.sh +++ b/x-pack/plugins/security_solution/server/lib/detection_engine/scripts/find_alerting_rules.sh @@ -12,7 +12,7 @@ set -e # Example: ./find_alerting_rules.sh # https://www.elastic.co/docs/api/doc/kibana/v8/operation/operation-findrules -# use ./find_rules.sh to work with Detection(Security) rules +# Related: use ./find_rules.sh to retrieve Detection Engine (Security) rules curl -s -k \ -u ${ELASTICSEARCH_USERNAME}:${ELASTICSEARCH_PASSWORD} \ -X GET ${KIBANA_URL}${SPACE_URL}/api/alerting/rules/_find \