You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/search/behavior-insights/index.md
+8-6Lines changed: 8 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,6 +4,8 @@ title: Behavior Insights
4
4
description: Gain behavioral insight of your environment using LogReduce operators.
5
5
---
6
6
7
+
import useBaseUrl from '@docusaurus/useBaseUrl';
8
+
7
9
Behavior Insights encompasses three log search operators to accelerate insights, troubleshooting, and action plans using structured logs. About 23% of the daily log ingest volume pertains to JSON data and accounts for a growing share of total log volume. This growth is driven by modern applications and underlying cloud (AWS, GCP, Azure) and orchestrator logs. Behavior Insights helps answer the following questions for SecOps, DevOps, and business users:
8
10
9
11
* What activity patterns are evident from structured logs? What patterns are trending?
@@ -17,20 +19,20 @@ In this section, we'll introduce the following concepts:
Copy file name to clipboardExpand all lines: docs/search/behavior-insights/logexplain.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,7 +54,7 @@ With the provided results you can:
54
54
* Field values must be categorical.
55
55
*[Built-in metadata fields](/docs/search/get-started-with-search/search-basics/built-in-metadata) are not supported.
56
56
* Not supported with [Real Time alerts](../../alerts/scheduled-searches/create-real-time-alert.md).
57
-
*[Time Compare](/docs/search/time-compare) and the [compare operator](/docs/search/search-query-language/search-operators/compare) are not supported against LogExplain results.
57
+
*[Time Compare](/docs/search/time-compare) and the [`compare` operator](/docs/search/search-query-language/search-operators/compare) are not supported against LogExplain results.
58
58
* Response fields `_explanation`, `_relevance`, `_test_coverage`, and `_control_coverage` are not supported with [Dashboard filters](/docs/dashboards/filter-template-variables).
59
59
* If you reach the memory limit you can try to shorten the time range or the number of specified fields. When the memory limit is reached you will get partial results on a subset of your data.
60
60
@@ -132,11 +132,11 @@ Results show the relevance of each explanation:
132
132
133
133
As a SecOps user, I want to detect compromised user credentials for Windows machines.
134
134
135
-
SecOps Insight: A hacked credential will display a remote login pattern (eventdata_logontype = 10) where a given user logs into more machines than they usually do, based on eventid = 4624 (login successful). I want to baseline 14 days of remote access activity and detect outliers in the most recent 24 hours.
135
+
SecOps Insight: A hacked credential will display a remote login pattern (`eventdata_logontype=10`) where a given user logs into more machines than they usually do, based on `eventid=4624` (login successful). I want to baseline 14 days of remote access activity and detect outliers in the most recent 24 hours.
136
136
137
137
#### Approach 1: Time Compare
138
138
139
-
The time compare query attempts to enumerate all machine-to-user combinations over the past 24 hours and compares the average daily logins for each pair of machine and user. As `compare` only supports up to 8 sequential slices, the data has to be sliced into 2day intervals with 7 epochs, to create 14 days of data.
139
+
The time compare query attempts to enumerate all machine-to-user combinations over the past 24 hours and compares the average daily logins for each pair of machine and user. As `compare` only supports up to 8 sequential slices, the data has to be sliced into 2-day intervals with 7 epochs, to create 14 days of data.
In an example dataset, this requires you to examine just 4 results, versus 773 in the worst case for time compare. The machines were not reported as significant in the `logexplain` algorithm, as they appeared at relatively the same frequency in both the baseline and comparison logs. Subjectively, the 4 users identified by `logexplain` were among the 150 results in the `time compare` query, sorted by percent increase in activity, so we believe our accuracy was at least as good as `time compare` with fewer results for the user to examine.
164
164
165
-
One important difference for `logexplain` is that it is able to detectusers who were very active 14 days ago but are no longer or less active recently. This is important as hackers may have left the network by the time Sec Ops chooses to run any of these queries. Time compare on the other hand, if sorted based on percent increase of activity, will force the user to examine all 773 user-machine combinations to get the full picture.
165
+
One important difference for `logexplain` is that it is able to detect users who were very active 14 days ago but are no longer or less active recently. This is important as hackers may have left the network by the time SecOps chooses to run any of these queries. Time compare on the other hand, if sorted based on percent increase of activity, will force the user to examine all 773 user-machine combinations to get the full picture.
Copy file name to clipboardExpand all lines: docs/search/behavior-insights/logreduce/logreduce-values.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ description: Group by the values of specific keys in JSON logs.
6
6
7
7
8
8
9
-
The **LogReduce Values** operator allows you to quickly explore structured logs by known keys. Structured logs can be in JSON, CSV, key-value, or any structured format. Unlike the LogReduce Keys operator, you need to specify the keys you want to explore. The values of each specified key are parsed and aggregated for you to explore.
9
+
The **LogReduce Values** operator allows you to quickly explore structured logs by known keys. Structured logs can be in JSON, CSV, key-value, or any structured format. Unlike the [LogReduce Keys operator](/docs/search/behavior-insights/logreduce/logreduce-keys), you need to specify the keys you want to explore. The values of each specified key are parsed and aggregated for you to explore.
10
10
11
11
This operator does not automatically [parse](/docs/search/search-query-language/parse-operators) your logs. You need to parse the keys you want to explore prior to specifying them in the LogReduce Values operation.
0 commit comments