Skip to content

Commit 5c835fd

Browse files
committed
Adjustment to nodrop
1 parent c6ce4bd commit 5c835fd

File tree

7 files changed

+8
-8
lines changed

7 files changed

+8
-8
lines changed

docs/integrations/amazon-aws/waf.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,7 @@ The Sumo Logic app for AWS WAF analyzes traffic flowing through AWS WAF and auto
5858
```sql title="Client IP Threat Info"
5959
_sourceCategory=AWS/WAF {{client_ip}}
6060
| parse "\"httpMethod\":\"*\"," as httpMethod,"\"httpVersion\":\"*\"," as httpVersion,"\"uri\":\"*\"," as uri, "{\"clientIp\":\"*\",\"country\":\"*\"" as clientIp,country, "\"action\":\"*\"" as action, "\"matchingNonTerminatingRules\":[*]" as matchingNonTerminatingRules, "\"rateBasedRuleList\":[*]" as rateBasedRuleList, "\"ruleGroupList\":[*]" as ruleGroupList, "\"httpSourceId\":\"*\"" as httpSourceId, "\"httpSourceName\":\"*\"" as httpSourceName, "\"terminatingRuleType\":\"*\"" as terminatingRuleType, "\"terminatingRuleId\":\"*\"" as terminatingRuleId, "\"webaclId\":\"*\"" as webaclId nodrop
61-
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=clientip nodrop
61+
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=clientip
6262
```
6363
<!-- Replace code example with this after `sumo://threat/i471` is replaced by `threatlookup`:
6464
```sql title="Client IP Threat Info"

docs/integrations/security-threat-detection/threat-intel-quick-analysis.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@ _sourceCategory=cylance "IP Address"
4141
| parse regex "(?<ip_address>\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})"
4242
| where !isNull(ip_address)
4343
| where ip_address != "0.0.0.0" and ip_address != "127.0.0.1"
44-
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=ip_address nodrop
44+
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=ip_address
4545
```
4646

4747
<!-- Replace section content with this after `sumo://threat/i471` is replaced by `threatlookup`:

docs/search/search-query-language/search-operators/tolowercase-touppercase.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -52,7 +52,7 @@ which provides results like:
5252
| toLowerCase ("B101CD29E18A515753409AE86CE68A4CEDBE0D640D385EB24B9BBB69CF8186AE") as hash
5353
| count hash
5454
| fields -_count
55-
| lookup raw from sumo://threat/cs on threat = hash{code} nodrop
55+
| lookup raw from sumo://threat/cs on threat = hash{code}
5656
```
5757

5858
<!-- Replace code example with this after `sumo://threat/i471` is replaced by `threatlookup`:

docs/search/subqueries.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -386,7 +386,7 @@ _sourceCategory=weblogs
386386
| where connectionDirection = "OUTBOUND"
387387
| json field=remoteipdetails "ipAddressV4" as src_ip
388388
| lookup type, actor, raw, threatlevel from sumo://threat/cs on src_ip=threat
389-
| where threatlevel = "high" nodrop
389+
| where threatlevel = "high"
390390
| compose src_ip]
391391
```
392392
<!-- Replace code example with this after `sumo://threat/i471` is replaced by `threatlookup`:

docs/security/additional-security-features/threat-detection-and-investigation.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -288,7 +288,7 @@ We need a way to see if any of the IP addresses we have logged are known threats
288288
_sourceCategory=Labs/AWS/CloudTrail
289289
| parse regex "(?<ip_address>\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})" multi
290290
| where ip_address != "0.0.0.0" and ip_address != "127.0.0.1"
291-
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=ip_address nodrop
291+
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=ip_address
292292
| where type="ip_address" and !isNull(malicious_confidence)
293293
| if (isEmpty(actor), "Unassigned", actor) as Actor
294294
| parse field=raw "\"ip_address_types\":[\"*\"]" as ip_address_types nodrop

docs/security/threat-intelligence/about-threat-intelligence.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -134,9 +134,9 @@ In most cases, no change is needed if you use the [lookup](/docs/search/search-q
134134

135135
You may need to make changes in these scenarios:
136136
* The `domain-name` and `email-addr` types are not supported in Intel 471. If you filter for these types using the `lookup` operator, update your queries to remove them.
137-
* If you parse the `raw` field returned from the `lookup` operation, you will see different fields when you use the new `SumoLogic_ThreatIntel` source. To avoid problems with fields not returning data, use a [nodrop](/docs/search/search-query-language/parse-operators/parse-nodrop-option/) clause. In the following excerpt from a query, `nodrop` is added at the end of the line where `field=raw` is called:
137+
* If you parse the `raw` field returned from the `lookup` operation, you will see different fields when you use the new `SumoLogic_ThreatIntel` source. To avoid problems with fields not returning data after April 30, 2025, use a [nodrop](/docs/search/search-query-language/parse-operators/parse-nodrop-option/) clause when you use `parse field=raw` or `json field=raw`. In the following excerpt from a query, `nodrop` is added at the end of the line where `json field=raw` is called:
138138
```
139-
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=ip_address
139+
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=src_ip
140140
| json field=raw "labels[*].name" as label_name nodrop
141141
```
142142

docs/security/threat-intelligence/find-threats.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ _sourceCategory=cylance "IP Address"
2020
| parse regex "(?<ip_address>\b\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})"
2121
| where !isNull(ip_address)
2222
| where ip_address != "0.0.0.0" and ip_address != "127.0.0.1"
23-
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=ip_address nodrop
23+
| lookup type, actor, raw, threatlevel as malicious_confidence from sumo://threat/cs on threat=ip_address
2424
```
2525

2626
For more information about how to use `sumo://threat/cs` in queries, see [Threat Intel optimization](/docs/integrations/security-threat-detection/threat-intel-quick-analysis/#threat-intel-optimization) in the *Threat Intel Quick Analysis* article.

0 commit comments

Comments
 (0)