Skip to content

Commit bae5044

Browse files
authored
Query syntax fix (#5381)
* Query syntax fix * minor fix
1 parent 7700096 commit bae5044

File tree

10 files changed

+19
-10
lines changed

10 files changed

+19
-10
lines changed

docs/integrations/amazon-aws/cost-explorer.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -70,7 +70,7 @@ Create a Field Extraction Rule (FER) for AWS Cost Explorer Logs. Learn how to cr
7070
```
7171
* **Parse Expression:** Enter a parse expression to create an “account” field that maps to the alias you set for each sub account. For example, if you used the “securityprod” alias for an AWS account with ID "123456789" and the “infraprod” alias for an AWS account with ID "987654321", your parse expression would look like:
7272
```sql
73-
json "LinkedAccount"
73+
| json "LinkedAccount"
7474
| if (LinkedAccount = "123456789", "securityprod", LinkedAccount ) as LinkedAccount
7575
| if (LinkedAccount = "987654321", "infraprod", LinkedAccount ) as LinkedAccount
7676
```

docs/integrations/security-threat-detection/crowdstrike-falcon-endpoint-protection.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -178,7 +178,7 @@ _sourceCategory=*Crowdstrike* DetectionSummaryEvent
178178
_sourceCategory=*Crowdstrike* AuthActivityAuditEvent (userAuthenticate or twoFactorAuthenticate)
179179
| json "metadata.eventType", "metadata.customerIDString", "metadata.eventCreationTime" as event_type, customer_id, event_time
180180
| formatDate(fromMillis(event_time), "MM/dd/yyyy HH:mm:ss:SSS") as event_time
181-
| json "event.UserId", "event.UserIp", "event.OperationName", "event.ServiceName", "event.Success", "event.UTCTimestamp" as src_user, user_ip, operation_name, service_name, success, operation_tim
181+
| json "event.UserId", "event.UserIp", "event.OperationName", "event.ServiceName", "event.Success", "event.UTCTimestamp" as src_user, user_ip, operation_name, service_name, success, operation_time
182182
| formatDate(fromMillis(operation_time), "MM/dd/yyyy HH:mm:ss:SSS") as operation_time
183183
| where success="true"
184184
| count by operation_time, operation_name, src_user, user_ip

docs/manage/field-extractions/fer-templates/akamai-cloud-monitor.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -79,7 +79,7 @@ description: Parse the common fields in your Akamai Cloud Monitor log using the
7979
**Parsing Rule:**
8080

8181
```sql
82-
parse "\"reqMethod\":\"*\"" as method, "\"status\":\"*\"" as status, "\"fwdHost\":\"*\"" as origin
82+
| parse "\"reqMethod\":\"*\"" as method, "\"status\":\"*\"" as status, "\"fwdHost\":\"*\"" as origin
8383
| parse "\"bytes\":\"*\"" as bytes, "\"edgeIP\":\"*\"" as edgeip, "\"country\":\"*\"" as country, "\"cookie\":\"*\"" as cookie
8484
```
8585

docs/manage/field-extractions/fer-templates/apache-access-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ description: Parse the common fields in your Apache Access Logs using the FER te
1818
**Parsing Rule**:
1919

2020
```
21-
parse regex "^(?<src_ip>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})"
21+
| parse regex "^(?<src_ip>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})"
2222
| parse regex "(?<method>[A-Z]+)\s(?<url>\S+)\sHTTP/[\d\.]+\"\s(?<status_code>\d+)\s(?<size>[\d-]+)\s\"(?<referrer>.*?)\"\s\"(?<user_agent>.+?)\".*"
2323
```
2424

docs/manage/field-extractions/fer-templates/apache-tomcat-access-log-fer.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,9 @@ description: Create a field extraction rule for Apache Tomcat 7 Access Logs.
1919
**Extraction Rule:**
2020

2121
```sql
22-
| parse regex "(?<ip>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}? )" | parse regex "\"(?<method>\D{1,7}? )" | parse regex "\"\D{1,7} (?<url>\S{1,2048}? )" | parse regex "\" (?<status>\d{3}? )" | parse regex "\" \d{3} (?<time_taken>\d{1,}? )" | parse regex "\" \d{3} \d{1,} (?<bytes_sent>\d{1,}?)"
22+
| parse regex "(?<ip>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}? )"
23+
| parse regex "\"(?<method>\D{1,7}? )" | parse regex "\"\D{1,7} (?<url>\S{1,2048}? )" | parse regex "\" (?<status>\d{3}? )" | parse regex "\" \d{3} (?<time_taken>\d{1,}? )"
24+
| parse regex "\" \d{3} \d{1,} (?<bytes_sent>\d{1,}?)"
2325
```
2426
2527
**Resulting Fields:**

docs/manage/field-extractions/fer-templates/apache-tomcat-access-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ description: Parse the common fields in your Apache Tomcat Access Logs using the
1717
**Parsing Rule**:
1818

1919
```sql
20-
parse regex "(?<ip>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}? )"
20+
| parse regex "(?<ip>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3}? )"
2121
| parse regex "\"(?<method>\D{1,7}? )"
2222
| parse regex "\"\D{1,7} (?<url>\S{1,2048}? )"
2323
| parse regex "\" (?<status>\d{3}? )"

docs/manage/field-extractions/fer-templates/cisco-fwsm-fer.md

Lines changed: 8 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -147,5 +147,12 @@ _sourceCategory=networking/cisco/fwsm src dst ("Deny inbound" OR "Deny protocol"
147147
**Extraction Rule:**
148148

149149
```sql
150-
parse "Deny protocol * " as protocol nodrop | parse ") * " as protocol nodrop | parse regex "%[A-Z]{4}-(?<severity>\d)-(?<msg_code>\d{6}):\s" nodrop | parse regex "src\s(?<src_dom>\S+):(?<src_ip>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})" nodrop | parse regex "/(?<src_port>\d+)\s" nodrop | parse regex "dst\s(?<dest_dom>\S+):(?<dest_ip>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})" nodrop | parse regex "/(?<dest_port>\d+)\s" nodrop | "firewall-deny" as eventtype | "cisco-firewall" as event
150+
| parse "Deny protocol * " as protocol nodrop | parse ") * " as protocol nodrop
151+
| parse regex "%[A-Z]{4}-(?<severity>\d)-(?<msg_code>\d{6}):\s" nodrop
152+
| parse regex "src\s(?<src_dom>\S+):(?<src_ip>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})" nodrop
153+
| parse regex "/(?<src_port>\d+)\s" nodrop
154+
| parse regex "dst\s(?<dest_dom>\S+):(?<dest_ip>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})" nodrop
155+
| parse regex "/(?<dest_port>\d+)\s" nodrop
156+
| "firewall-deny" as eventtype
157+
| "cisco-firewall" as event
151158
```

docs/manage/field-extractions/fer-templates/nginx-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ description: Parse the common fields in your Nginx Logs using the FER template.
1919
**Parsing Rule**:
2020

2121
```sql
22-
parse regex "^(?<src_ip>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})"
22+
| parse regex "^(?<src_ip>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})"
2323
| parse regex "(?<method>[A-Z]+)\s(?<url>\S+)\sHTTP/[\d\.]+\"\s(?<status_code>\d+)\s(?<size>[\d-]+)\s\"(?<referrer>.*?)\"\s\"(?<user_agent>.+?)\".*"
2424
```
2525

docs/manage/field-extractions/fer-templates/varnish-logs.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ description: Parse the common fields in your Varnish Logs using the FER template
1818
**Parsing Rule:**
1919

2020
```sql
21-
parse regex "^(?<src_ip>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})"
21+
| parse regex "^(?<src_ip>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})"
2222
| parse regex "(?<method>[A-Z]+)\s(?<url>\S+)\sHTTP/[\d\.]+\"\s(?<status_code>\d+)\s(?<size>[\d-]+)\s\"(?<referrer>.*?)\"\s\"(?<user_agent>.+?)\".*"
2323
```
2424

docs/manage/field-extractions/safend-field-extraction.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ _sourceCategory=safend
2626
**Extraction Rule:**
2727

2828
```sql
29-
parse regex "Action: (?<action>[^,]*)" nodrop
29+
| parse regex "Action: (?<action>[^,]*)" nodrop
3030
| parse " * [" as host nodrop | parse "] *:" as alert_type nodrop
3131
| parse "User: *," as user nodrop
3232
| parse "Computer: *," as computer nodrop

0 commit comments

Comments
 (0)