构建 KQL 查询
Kusto 查询语言 (KQL) 是可用于查询 QRadar® 数据湖的查询语言。 KQL 允许您构建从简单搜索查询到更复杂的聚集查询的各种不同类型的查询。
程序
结果
在运行查询时,将添加一个“活动查询”卡片。 每个查询在创建后 4 天到期。 到期时间显示在卡上。
示例
返回事件表中的 100 行。
events
| take 100
返回事件数最多的 10 个事件类别。
events_all
| summarize Count=count() by qid_event_category
| order by Count desc
| take 10
返回具有最多事件计数的 10 个数据源。
events
| project data_source_name, original_time
| where data_source_name != ''
| summarize Events=count() by data_source_name
| order by Events desc
| take 10
返回过去一小时内的数据源。
events
| project original_time, data_source_name
| where original_time > ago(1h)
| summarize Count=count() by Time=bin(original_time, 5m), data_source_name
| order by Time, data_source_name desc
返回过去 5 分钟内的事件,最多 10000 个事件。
events
| project original_time, data_source_name, name, user_id, low_level_categories,
src_ip, src_port, dst_ip, dst_port, payload
//--- Search for the last 5 minutes of data
| where original_time > ago(5m)
//--- USER Criteria Here
| take 10000
返回过去一小时内最多 10000 个事件
events
| project original_time, data_source_name, name, user_id, low_level_categories,
src_ip, src_port, dst_ip, dst_port, payload
//--- Search for the last hour of data
| where original_time > ago(5m)
//--- USER Criteria Here
| take 10000
搜索过去 24 小时内具有源 IP 地址 127.0.0.1的事件。
events
| project original_time, data_source_name, name, user_id, low_level_categories,
src_ip, src_port, dst_ip, dst_port, payload
//--- Search for IP = 127.0.0.1 over the last 24 hour of data
| where original_time > ago(24h) and src_ip = ‘127.0.0.1’
//--- USER Criteria Here
| take 100
搜索过去 24 小时内没有源 IP 地址 127.0.0.1的事件。
events
| project original_time, data_source_name, name, user_id, low_level_categories,
src_ip, src_port, dst_ip, dst_port, payload
//--- Search for IP not equal to 127.0.0.1 over the last 24 hour of data
| where original_time > ago(24h) and src_ip != ‘127.0.0.1’
//--- USER Criteria Here
| take 100
搜索最近一个小时的事件,其中有效内容与 svchost匹配。
events
| project original_time, data_source_name, name, user_id, low_level_categories,
src_ip, src_port, dst_ip, dst_port, payload
//--- Search for payload that has a match on ‘svchost’ over last hour
| where original_time > ago(1h) and payload has ‘svchost’
//--- USER Criteria Here
| take 100