SafeNetworking Search Examples - PaloAltoNetworks/SafeNetworking GitHub Wiki
Read the troubleshooting searches for beginners doc. It’s not too long. It will help explain some of the weirdness that you may encounter when the searches don't return what you thought it would.
Example 1
Get the latest 20 entries (by default it only shows the last 5) for any threat events and sort by the received_at value in descending order (newest first).
GET threat-*/_search
{
"size": 20,
"query": {
"match_all": {}
},
"sort": [
{
"@timestamp": {
"order": "desc"
}
}
]
}
Why sort? By default, ES “weighs” each response with a relevancy score and you get the most heavily weighted response first. This gives us the results ordered by the score, not by the order in which we added them. ES does have “Search” in the name, so this makes sense – it actually performs searches on relevant data, not just grabbing stuff dumped to the DB. So, we just have to order it by one of the date fields.
Example 2
Get everything (notice we are not searching on a particular index – so it could be threat-, traffic-, etc) and match on both threat_category having the word dns in it AND processed is 0
GET _search
{
"query":{
"bool": {
"must": [
{"match": {"ThreatCategory": "dns"}},
{"match": {"SFN.processed":"0"}}
]
}
},
"sort": [
{
"@timestamp": {
"order": "desc"
}
}
]
}
Example 3
Looking only in threat indexed documents, return unprocessed items that match the threat category having the word “wildfire” in it. Notice that they actually have “dns-wildfire” in the results. If you were to put dns-wildfire in the search, you would get everything with either dns OR wildfire in the text. Why? Since, by default, ES stores everything as a string, it uses a text analyzer to do the indexing of all the words. It gets rid of punctuation and each word becomes an indexed item. So in this case, it would remove the “-“ and index both dns and wildfire. So, if we had “dns-wildfire” in the search, the text analyzer for the search would also remove the “-“ and the search would really be “show me anything with dns OR wildfire in it” – thus it would match all records that have “dns” and “dns-wildfire” in it.
GET threat-*/_search
{
"query": {
"bool": {
"must": [
{"match": {"ThreatCategory": "wildfire"}},
{"match": {"SFN.processed": "0" }}
]
}
},
"sort": [
{
"@timestamp": {
"order": "desc"
}
}
]
}
Example 4
Delete all documents in the index threat-2018.05.01 (zero it out essentially). This does not delete the index, only the contents.
POST threat-2018.05.01/_delete_by_query
{
"query" : {
"match_all": {}
}
}
If you have search examples that you believe would benefit here, please add them.