Skip to content

Commit 090a4c5

Browse files
committed
Annotate comments
1 parent fe20b89 commit 090a4c5

File tree

7 files changed

+7
-7
lines changed

7 files changed

+7
-7
lines changed

docs/integrations/amazon-aws/waf.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ _sourceCategory=AWS/WAF {{client_ip}}
6060
| parse "\"httpMethod\":\"*\"," as httpMethod,"\"httpVersion\":\"*\"," as httpVersion,"\"uri\":\"*\"," as uri, "{\"clientIp\":\"*\",\"country\":\"*\"" as clientIp,country, "\"action\":\"*\"" as action, "\"matchingNonTerminatingRules\":[*]" as matchingNonTerminatingRules, "\"rateBasedRuleList\":[*]" as rateBasedRuleList, "\"ruleGroupList\":[*]" as ruleGroupList, "\"httpSourceId\":\"*\"" as httpSourceId, "\"httpSourceName\":\"*\"" as httpSourceName, "\"terminatingRuleType\":\"*\"" as terminatingRuleType, "\"terminatingRuleId\":\"*\"" as terminatingRuleId, "\"webaclId\":\"*\"" as webaclId nodrop
6161
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=clientip
6262
```
63-
<!-- Replace code example with this after `sumo://threat/i471` is replaced by `threatlookup`:
63+
<!-- Per DOCS-643, replace code example with this after `sumo://threat/cs` is replaced by `threatlookup`:
6464
```sql title="Client IP Threat Info"
6565
_sourceCategory=AWS/WAF {{client_ip}}
6666
| parse "\"httpMethod\":\"*\"," as httpMethod,"\"httpVersion\":\"*\"," as httpVersion,"\"uri\":\"*\"," as uri, "{\"clientIp\":\"*\",\"country\":\"*\"" as clientIp,country, "\"action\":\"*\"" as action, "\"matchingNonTerminatingRules\":[*]" as matchingNonTerminatingRules, "\"rateBasedRuleList\":[*]" as rateBasedRuleList, "\"ruleGroupList\":[*]" as ruleGroupList, "\"httpSourceId\":\"*\"" as httpSourceId, "\"httpSourceName\":\"*\"" as httpSourceName, "\"terminatingRuleType\":\"*\"" as terminatingRuleType, "\"terminatingRuleId\":\"*\"" as terminatingRuleId, "\"webaclId\":\"*\"" as webaclId nodrop

docs/observability/aws/integrations/aws-dynamodb.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ _sourceCategory=Labs/AWS/DynamoDB account=* namespace=* "\"eventSource\":\"dynam
6969
| sum (ip_count) as threat_count
7070
```
7171
72-
<!-- Replace code example with this after `sumo://threat/i471` is replaced by `threatlookup`:
72+
<!-- Per DOCS-643, replace code example with this after `sumo://threat/cs` is replaced by `threatlookup`:
7373
```sql title="All IP Threat Count"
7474
_sourceCategory=Labs/AWS/DynamoDB account=* namespace=* "\"eventSource\":\"dynamodb.amazonaws.com\""
7575
| json "eventName", "awsRegion", "requestParameters.tableName", "sourceIPAddress", "userIdentity.userName" as event_name, Region, entity, ip_address, user

docs/search/search-query-language/search-operators/threatip.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ sidebar_label: threatip
66

77
The `threatip` operator correlates data in the [Sumo Logic threat intelligence sources](/docs/security/threat-intelligence/about-threat-intelligence/#sumo-logic-threat-intelligence-sources) based on IP addresses from your log data. This provides security analytics that helps you to detect threats in your environment, while also protecting against sophisticated and persistent cyber-attacks.
88

9-
<!--
9+
<!-- Add this per DOCS-815:
1010
You can also use the [`threatlookup`](/docs/search/search-query-language/search-operators/threatlookup/) search operator to search threat intelligence indicators.
1111
-->
1212

docs/search/search-query-language/search-operators/tolowercase-touppercase.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -55,7 +55,7 @@ which provides results like:
5555
| lookup raw from sumo://threat/cs on threat = hash{code}
5656
```
5757

58-
<!-- Replace code example with this after `sumo://threat/i471` is replaced by `threatlookup`:
58+
<!-- Per DOCS-643, replace code example with this after `sumo://threat/cs` is replaced by `threatlookup`:
5959
```sql
6060
*
6161
| limit 1

docs/search/subqueries.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -389,7 +389,7 @@ _sourceCategory=weblogs
389389
| where threatlevel = "high"
390390
| compose src_ip]
391391
```
392-
<!-- Replace code example with this after `sumo://threat/i471` is replaced by `threatlookup`:
392+
<!-- Per DOCS-643, replace code example with this after `sumo://threat/cs` is replaced by `threatlookup`:
393393
```sql
394394
_sourceCategory=weblogs
395395
[subquery:_sourceCategory="Labs/SecDemo/guardduty" "EC2 Instance" "communicating on an unusual server port 22"

docs/security/additional-security-features/threat-detection-and-investigation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -298,7 +298,7 @@ We need a way to see if any of the IP addresses we have logged are known threats
298298
| fields - ip_address,malicious_confidence,actor,kill_chains,ip_address_types,_sourceCategory,_source | count by _timeslice
299299
| outlier _count window=5,threshold=3,consecutive=1,direction=+-
300300
```
301-
<!-- Replace code example with this after `sumo://threat/i471` is replaced by `threatlookup`:
301+
<!-- Per DOCS-643, replace code example with this after `sumo://threat/cs` is replaced by `threatlookup`:
302302
```
303303
_sourceCategory=Labs/AWS/CloudTrail
304304
| parse regex "(?<ip_address>\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})"

docs/security/threat-intelligence/find-threats.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ To find threats using IP addresses, use the `threatip` search operator. This ope
3737

3838
For more information, see [threatip Search Operator](/docs/search/search-query-language/search-operators/threatip/).
3939

40-
<!--
40+
<!-- Add per DOCS-815:
4141
## threatlookup operator
4242
4343
You can use the `threatlookup` search operator to find matches to indicators in any source in the Sumo Logic [threat intelligence](/docs/security/threat-intelligence/) datastore.

0 commit comments

Comments
 (0)