-
Notifications
You must be signed in to change notification settings - Fork 8.5k
[KQL] Add support for case-insensitive searches #55378
Copy link
Copy link
Closed as not planned
Labels
Feature:KQLKQLKQLFeature:SearchQuerying infrastructure in KibanaQuerying infrastructure in KibanaTeam:DataDiscoveryDiscover, search (data plugin and KQL), data views, saved searches. For ES|QL, use Team:ES|QL. t//Discover, search (data plugin and KQL), data views, saved searches. For ES|QL, use Team:ES|QL. t//enhancementNew value added to drive a business resultNew value added to drive a business resultimpact:highAddressing this issue will have a high level of impact on the quality/strength of our product.Addressing this issue will have a high level of impact on the quality/strength of our product.loe:mediumMedium Level of EffortMedium Level of Effort
Metadata
Metadata
Assignees
Labels
Feature:KQLKQLKQLFeature:SearchQuerying infrastructure in KibanaQuerying infrastructure in KibanaTeam:DataDiscoveryDiscover, search (data plugin and KQL), data views, saved searches. For ES|QL, use Team:ES|QL. t//Discover, search (data plugin and KQL), data views, saved searches. For ES|QL, use Team:ES|QL. t//enhancementNew value added to drive a business resultNew value added to drive a business resultimpact:highAddressing this issue will have a high level of impact on the quality/strength of our product.Addressing this issue will have a high level of impact on the quality/strength of our product.loe:mediumMedium Level of EffortMedium Level of Effort
Type
Fields
Give feedbackNo fields configured for issues without a type.
Describe the feature:
Requesting the implementation of an
UPPER()function in KQL to be applied to fields, converting the record content to all uppercase.UPPER(url.original):*SELECT*KQL currently lacks a mechanism to perform case-insensitive searches. When using Kibana for system log analysis, attackers can evade detection by mixing case in data that would show up in web logs. For example, a search to identify a SQL injection attack utilizing the SQL UNION keyword might be:
url.original:*UNION*An attacker who constructs an attack where the HTTP request uses the SQL keyword UnioN would evade detection with this KQL query.
Describe a specific use case for the feature:
Thank you for your consideration.
-Josh