Searching Your Data
    • 12 Mar 2025
    • 2 Minutes to read
    • PDF

    Searching Your Data

    • PDF

    Article summary

    The Security Data Lake Search page enables you to write Structured Query Language (SQL) searches against your data stored in the Security Data Lake.

    This is useful for security practitioners who need to review their logs for specific events, answer questions like “Is this normal or anomalous?”, aggregate data to identify trends, or perform complex analysis to uncover hidden threats.

    Navigate to the Search page

    From the navigation menu, under Your Environment, click on Security Data Lake.

    Overview of the Search page

    The Search page for the Security Data Lake is similar to a SQL client for a relational database engine:

    1. Table Explorer: See a list of tables that can be included in queries. Clicking a table opens a slide-out with more details about the table and its schema.

    2. Query Window: Compose your SQL query here.

    3. Results Window: View the results of your queries here.

    Table Explorer

    The Table Explorer is the best way to understand what you can search in the Security Data Lake, and how it is structured. Each entry corresponds to a table that can be included in a query. Tables correspond to your active integrations that support data lake search.

    To see the available columns for a table:

    1. Click the table name you are interested in.

    2. A slide-out will appear with details about the table and a list of columns that you can include in queries.

    To generate a sample query for a table:

    1. Click the table name you are interested in.

    2. A slide-out with table details will appear.

    3. Click Query this table to generate a sample SQL query. The query will be automatically pasted into the Query Window.

    Query Window

    The Query Window is where you can build/compose your SQL queries. You can write them by hand or use the Table Explorer to generate a query automatically.

    1. The Query field is where you can write your SQL query.

    2. The Time Selector limits the date/time range upon which your query will be executed. This ensures that queries run quickly and can be adapted to run on different time periods without having to edit your original SQL query.

    3. Click the Execute button to submit the query and get the results.

    4. Results will automatically appear below the Query Window when available.

    Results Window

    After running a query, the results will be displayed at the bottom of the page below the Execute button.

    1. If the query execution was successful, you will see the results displayed in tabular form.

    2. If the query was unable to be executed (for example, if there was a syntax error, ambiguous schema reference, invalid SQL, etc.) you will see an error message explaining why.

    What is searchable?

    Integrations that support SQL querying will be marked as “Searchable” under the Data Is column on the Integrations page. This includes Security Data Lake Syslog and Zscaler integrations. Refer to those integrations pages to learn more about what fields are available to query.

    What queries are allowed?

    The Security Data Lake Search page is read-only, so Data Manipulation Language (DML) like INSERT, UPDATE, or DELETE is not valid. Similarly, Data Definition Language (DDL) like CREATE, ALTER, or DROP is not valid.

    SELECT statements are valid, and can include sub-queries and JOINs if needed. For a list of the supported built-in SQL functions and operators, refer to the official Trino documentation.


    Was this article helpful?

    Changing your password will log you out immediately. Use the new password to log back in.
    First name must have atleast 2 characters. Numbers and special characters are not allowed.
    Last name must have atleast 1 characters. Numbers and special characters are not allowed.
    Enter a valid email
    Enter a valid password
    Your profile has been successfully updated.