Skip to content

Commit 13c1355

Browse files
authored
DOCS-815 - Add new section to threatlookup beta (#6099)
* Add note to threatlookup beta * Added hidden comment
1 parent b5c6ea7 commit 13c1355

File tree

1 file changed

+39
-0
lines changed

1 file changed

+39
-0
lines changed

docs/search/search-query-language/search-operators/threatlookup.md

Lines changed: 39 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -131,3 +131,42 @@ cat sumo://threat-intel | formatDate(toLong(_threatlookup.valid_until), "yyyy-MM
131131
You cannot use the cat search operator with the `SumoLogic_ThreatIntel` source.
132132
:::
133133
-->
134+
135+
<!-- Remove the following "Upcoming change" section at GA. -->
136+
137+
## Upcoming change
138+
139+
The behavior of the `threatlookup` operator is changing in an upcoming release. Previously, rows without matches in threat intelligence sources were excluded from search results. With the new behavior, `threatlookup` will return one result row for each input indicator, even if there is no threat intel match. In such cases, the normalized threatlookup fields (for example, `_threatlookup.source`, `_threatlookup.confidence`, etc.) will be `null`.
140+
141+
### Impact
142+
143+
If you have saved queries, dashboards, or other workflows relying on the current behavior, they may return additional rows after this change. This could require you to update your logic to explicitly exclude rows with no matches.
144+
145+
### How to adapt
146+
147+
To retain the previous filtering and exclude rows without threat intel matches, add an explicit non-match filtering check, for example:
148+
149+
```
150+
_index=sec_record*
151+
| threatlookup singleIndicator srcDevice_ip
152+
| where _threatlookup.confidence > 50
153+
| where !isNull(_threatlookup.source)
154+
| timeslice 1h
155+
| count by _timeslice
156+
```
157+
158+
If you do not add this check, one row will be returned for every input, regardless of matches.
159+
160+
For example, given the log message:
161+
`198.51.100.7 - - [02/Dec/2025:08:40:01 +0000] "GET /admin/login.php HTTP/1.1" 404 250 "-" "Mozilla/5.0"`
162+
163+
The previous query was:
164+
165+
```
166+
* | parse regex "(?<client_ip>\d{1,3}\.\d{1,3}\.\d{1,3}\.\d{1,3})"
167+
| threatlookup singleIndicator client_ip
168+
```
169+
170+
Before, no result is returned if `198.51.100.7` is not in your threat intel sources.
171+
172+
After, one result row is returned, containing `_threatlookup.*` fields as `null`.

0 commit comments

Comments
 (0)