Day | Night | Moonlight

Preface

Swui, pronounced swooh-ie, is a component and style library for Swimlane projects. It is a intended to be the foundation of which new projects are built unifying a standard across all products.


Depedencies

Colors: Hues

  • {{color}}


Colors: Formatting

  • Backgrounds $color-bg-darkest
  • $color-bg-darker
  • $color-bg-dark
  • $color-bg-med
  • $color-bg-light
  • $color-bg-lighter
  • Text $color-text-dark
  • $color-text-med-dark
  • $color-text-med
  • $color-text-light
  • $color-text-lighter

Colors: Gradients

  • Linear ${{gradient}}
  • Bg Linear $bg-linear-1
  • $bg-linear-2
  • Bg Radial $bg-radial-1
  • $bg-radial-2

Colors: Branding

Colors: Ordinal Charts

  • {{colorGroup.name}}

Colors: Sequential Charts

  • {{colorGroup.name}}

Colors: Shadows

$shadow-{{i}}
shadow-fx

Typography

Headers are styled using Fira Sans and body elements using Lato.


Fira Sans Download on Google Fonts

{{letters}}

{{lettersLower}}

{{chars}}

{{nums}}



Lato Download on Google Fonts

{{letters}}

{{lettersLower}}

{{chars}}

{{nums}}

h1. Improve your Security Operations Insight and Automation

h2. Improve your Security Operations Insight and Automation

h3. Improve your Security Operations Insight and Automation

h4. Improve your Security Operations Insight and Automation

h5. Improve your Security Operations Insight and Automation

h1. Improve your Security Operations Insight and Automation

h2. Improve your Security Operations Insight and Automation

h3. Improve your Security Operations Insight and Automation

h4. Improve your Security Operations Insight and Automation

h5. Improve your Security Operations Insight and Automation
]]>
Default | Disabled
Default Disabled ]]>

As cyber attacks continue to rise, organizations are investing heavily in attack identification, threat intelligence and the staff required to protect the enterprise. However, alerts are still going unresolved, and often unseen. Realizing that simply adding people does not solve the problem, organizations are choosing Swimlane for security automation and orchestration

Swimlane consolidates security alerts from multiple sources and automatically assists organizations with the activities required to resolve alerts and stop attacks. The resolution of the alert can occur either automatically or manually by analyst intervention. Either way, the alert is resolved utilizing expert-defined processes, enabling the organization to cost-effectively close alerts.

Paragraphs with the 'hint' class are styled smaller with italics.

Paragraphs with the 'thin' class are light font weight.

Paragraphs with the 'ultra-thin' class are extra light font weight.


As cyber attacks continue to rise, organizations are investing heavily in attack identification, threat intelligence and the staff required to protect the enterprise. However, alerts are still going unresolved, and often unseen. Realizing that simply adding people does not solve the problem, organizations are choosing Swimlane for security automation and orchestration

Swimlane consolidates security alerts from multiple sources and automatically assists organizations with the activities required to resolve alerts and stop attacks. The resolution of the alert can occur either automatically or manually by analyst intervention. Either way, the alert is resolved utilizing expert-defined processes, enabling the organization to cost-effectively close alerts.

Paragraphs with the 'hint' class are styled smaller with italics.

Paragraphs with the 'thin' class are light font weight.

Paragraphs with the 'ultra-thin' class are extra light font weight.

]]>

var foo; var bar; ]]>

Typography: Icons

  • icon-{{icon}}

Tags

Small Default Large
Small Default Large ]]>

Inputs


]]>

]]>

]]>

Buttons


Default ]]>
Default Disabled Primary Warning Danger
Default Disabled Primary Warning Danger ]]>

Standard Autoupload

Choose File Choose File
Choose File Choose File ]]>

Standard Manual

Choose File Send
Choose File Send ]]>

Progress Progress Disabled
Progress Progress Disabled ]]>

Selects



]]>

Table

Attack Category Details
# Attack Type Date of Attack Origin of Attack
1 Malware 1/1/2011 China
2 DDOS 1/5/2011 Russia
3 DDOS 1/5/2011 China

Attack Category Details # Attack Type Date of Attack Origin of Attack 1 Malware 1/1/2011 China 2 DDOS 1/5/2011 Russia 3 DDOS 1/5/2011 China ]]>
# Attack Type Date of Attack Origin of Attack
1 Malware 1/1/2011 China
2 DDOS 1/5/2011 Russia
3 DDOS 1/5/2011 China

# Attack Type Date of Attack Origin of Attack 1 Malware 1/1/2011 China 2 DDOS 1/5/2011 Russia 3 DDOS 1/5/2011 China ]]>
# Attack Type Date of Attack Origin of Attack
1 Malware 1/1/2011 China
2 DDOS 1/5/2011 Russia
3 DDOS 1/5/2011 China

# Attack Type Date of Attack Origin of Attack 1 Malware 1/1/2011 China 2 DDOS 1/5/2011 Russia 3 DDOS 1/5/2011 China ]]>

Section

Hash rm -rf gc Starcraft continue *.* d00dz deadlock snarf endif wannabee tera perl less bar strlen tarball bytes ban headers gnu brute force. All your base are belong to us semaphore exception giga highjack system mailbomb eaten by a grue error fopen null. James T. Kirk firewall recursively hello world man pages protected. Some Content ]]>

Attack Found!

List
Hash rm -rf gc Starcraft continue *.* d00dz deadlock snarf endif wannabee tera perl less bar strlen tarball bytes ban headers gnu brute force. All your base are belong to us semaphore exception giga highjack system mailbomb eaten by a grue error fopen null. James T. Kirk firewall recursively hello world man pages protected.

Attack Found!

List
Some Content
]]> Hash rm -rf gc Starcraft continue *.* d00dz deadlock snarf endif wannabee tera perl less bar strlen tarball bytes ban headers gnu brute force. All your base are belong to us semaphore exception giga highjack system mailbomb eaten by a grue error fopen null. James T. Kirk firewall recursively hello world man pages protected. Some Content ]]> Hash rm -rf gc Starcraft continue *.* d00dz deadlock snarf endif wannabee tera perl less bar strlen tarball bytes ban headers gnu brute force. All your base are belong to us semaphore exception giga highjack system mailbomb eaten by a grue error fopen null. James T. Kirk firewall recursively hello world man pages protected. Some Content ]]>

Dialog



Open Dialog ]]>

Attack Found!



Attack Found!

]]>


Malware Detected. Found: context.count

]]>

Slider

]]>
]]>
]]>
]]>
]]>
]]>
]]>
]]>

Toolbar


]]>
dynamic title dynamic content
dynamic title dynamic content ]]>

Calendar

Basic

Current Date: {{curDate}}

]]>

Min/Max Dates

Min Date: {{minDate}} and Max Date: {{maxDate}}

]]>

Disabled


]]>

Date Time

Basic


]]>

Disabled


]]>

Invalid


]]>

Custom Format


]]>

Min/Max Dates


]]>

]]>

]]>

Tabs

Tab 1 Content Tab 2 Content Tab 3 Content Tab 1 Content Tab 2 Content Tab 3 Content ]]>

Code Editor



]]>

Tooltip

Top | Right | Bottom | Left | Sibling | Template | Large HTML | Custom Class

Top ]]>
Top | Right | Bottom | Left | Focus | Immediate | Disabled | No Caret {{shown}}

Tool tip custom content defined inside a template

With context binding: tooltipModel.text

Top ]]>

Dropdown



]]>



]]>
Link Content

Hello!




Link Content

Hello!

]]>

Drawer




Open Bottom Drawer ]]> ; constructor(private dialogMngr: DialogService) { } openDrawer(direction = 'left') { this.drawerMngr.open(this.editTmpl, { title: 'A dialog title', direction }); } } ]]>

Datatable

Basic angular2-data-table example styled for swui. Note: This module is not included in swui by default.


]]>

Inputs

Output: {{output | json}}


]]>

]]>

]]>

]]>


]]>

]]>

Toggle

]]>

]]>

Alert Everyone! All good! Alert Everyone! All good! ]]>

Checkbox

Simple

Alert the SOC Alert the SOC ]]>

Alert the SOC Alert the SOC ]]>

Large Label

System continue gobble error headers protocol gc exception leet ip alloc epoch less xss overflow mainframe concurrently perl tera. *.* bit interpreter gurfle firewall salt brute force double if spoof back door fopen wombat hexadecimal nak client pwned. Leapfrog root boolean rm -rf port Trojan horse finally linux mountain dew new bypass while terminal sudo /dev/null float.

Lists

Ordered

  1. DDOS
  2. Malware
  3. Physical
  • DDOS
  • Malware
  • Physical
  • ]]>


    Unordered

    • DDOS
    • Malware
    • Physical
  • DDOS
  • Malware
  • Physical
  • ]]>

    Reset

    Use .list-reset class to remove default styles

    • DDOS
    • Malware
    • Physical
  • DDOS
  • Malware
  • Physical
  • ]]>
  • File
  • Apply
  • ]]>
  • File
  • Apply
  • ]]>

    Notifications


    Type: Info ]]>


    WE ARE GETTING ATTACKED!

    ]]>