Searching for Secret Detectors
Use the search tokens below to search for secret detectors. Looking for help with writing your query? click here
container.secretDetector.namecontainer.secretDetector.name
Use a text value ##### to specify the name of the secret detector.
Example
Show secret detectors with this name.
container.secretDetector.name: 'AWS Access Key Id'
container.secretDetector.categorycontainer.secretDetector.category
Use a text value ##### to specify the category of the secret detector.
Example
Show secret detectors associated with this category.
container.secretDetector.category: AsymmetricPrivateKey
container.secretDetector.statuscontainer.secretDetector.status
Use a text value ##### to specify the status of the secret detectors. The valid values are "Active" and "Inactive".
Example
Show secret detectors with this status.
container.secretDetector.status: active
container.secretDetector.typecontainer.secretDetector.type
Use a text value ##### to specify the type of the secret detector. The valid values are "system" and "custom".
Example
Show system-defined secret detectors.
container.secretDetector.type: 'system'
container.secretDetector.severitycontainer.secretDetector.severity
Use a test value ##### to specify the severity of the secret detector. The valid values are "LOW", "MEDIUM", "HIGH", and "CRITICAL".
Examples
Show secret detectors of this severity.
container.secretDetector.severity: "HIGH"
andand
Use a boolean query to express your query using AND logic.
Example
Show events with type Standard and with action Allow
eventType: STANDARD and action: ALLOW
notnot
Use a boolean query to express your query using NOT logic.
Example
Show events that don't have Deny action
not action: DENY
oror
Use a boolean query to express your query using OR logic.
Example
Show events with one of these actions
action: ALLOW or action: MONITOR