StellarCyber Alerts
Configure StellarCyber to forward alerts to Radiant Security.
In this guide, you will learn how to configure StellarCyber to send specific alerts, including the full raw data to an external destination using a webhook with rs_token Token authentication.
Having the full, raw alerts is paramount for your alert comprehension.
Prerequisites
Add the data connector in Radiant Security
Log in to Radiant Security.
From the navigation menu, click Settings > Data Connectors and click + Add Connector.
Search for and select the Custom Alerts Webhook option and then click Data Feeds.
Click Credentials.
Under Credential Name, give the credential an identifiable name (e.g.
StellarCyber - Credentials).Under Required Credentials, enter a Connector tag (e.g.
stellarcyber_webhook_connector).Click Add Connector.
On the newly created connector, click View Details. Under Vendor Configuration, copy the
Webhook URLandTokenvalue. You’ll need it for the Configure alert actions section of this guide.Click Add Connector to save the changes.
Configure the webhook connector in StellarCyber
Set up the connection between StellarCyber and Radiant Security.
Log in to StellarCyber.
Navigate to System > Integrations > Connectors.
Click Create and select Connector.
In the General Tab, configure the following:
Category: Webhook
Type: Custom
Name: Radiant_Security_Alert_Ingestion
In the Configuration Tab, enter the Radiant Security connection details:
Hostname: Enter your Radiant Security destination URL that you copied from the previous section [
RADIANT_WEBHOOK_URL].Protocol: HTTPS
Port: 443
Authentication Type: Select Header
Header Name: Authorization
Header Value: Enter the token that you copied from the previous section [
YOUR_TOKEN].
Click Submit to save your connector.
Configure the Automated Threat Hunting (ATH) playbook
Now you'll create an ATH playbook that determines which alerts get sent to Radiant Security for AI-powered triage and investigation.
In StellarCyber, navigate to Respond > Automation.
Click Create.
Under Search Criteria, specify which alerts you want Radiant Security to process:
Indices: Select Alerts
Query: Enter your filtering logic to determine which alerts will be sent to Radiant Security (e.g.
severity: "Critical" OR msg_class: "malware_detected").
In the Action Section, set up the webhook action:
Click (+) Add Action
Type: Select Webhook Responder
Connector: Choose Radiant_Security_Alert_Ingestion (the connector you created earlier)
JSON Body: Copy and paste the JSON Body template from the next section
JSON Body template
Use this template in your playbook's JSON Body field. It captures all the essential alert information and includes the complete raw data for Radiant Security's AI to analyze:
JSON fields explained
timestamp: Sends the timestamp as Unix Epoch in milliseconds (e.g., 1707168000000), which is Stellar Cyber's native format.
raw_alert: By using
{{_source}}without quotes, the complete JSON object of the alert is included. This gives Radiant Security's AI access to all fields (IPs, usernames, process paths, etc.) to dynamically build triage logic and provide transparent reasoning and root cause analysis.
Important note: Make sure your raw alert includes a detailed description of what the rule is detecting. The more context you provide, the better Radiant Security's adaptive AI can triage the alert and correlate it across your data sources.
rule_name: This refers to the "Engine Name" that triggered the alert in Stellar Cyber.
Verify that the integration worked
After you save your ETH playbook, verify that alerts are being delivered successfully to Radiant Security:
Navigate to Respond > Actions > Webhook Actions.
Check the Response Code column:
200 or 201 means your alerts are being received by Radiant Security successfully.
401 indicates an authentication issue. Verify that your Bearer Token in the Connector settings hasn't expired.
Last updated
Was this helpful?