Mapping Fields to HBase Threat Intel
Now that you have data flowing into the HBase table, you need to ensure that the threat intel topology can be used to enrich the data flowing past.
You can perform this step using either the HCP Management module or the CLI. Both of these methods are described in the following subsections.