Latest Dynatrace
The DPL Architect tool helps you
DPL Architect provides instant feedback to your DPL pattern expression without the need to re-execute your DQL query. This saves you time and energy when determining what DPL expression you need. Feedback is given in two contexts: base dataset and match preview dataset.
The base dataset is created from the original query executed in Notebooks. The same query is executed in DPL Architect and saved as a base dataset to show you what portion is matched by the pattern you created.
The match preview dataset consists of records displayed in DPL Architect. When you open DPL Architect, the record from where you started to extract additional fields is displayed in the match preview editor. You can add additional lines from the base dataset by selecting Add to preview and, if needed, you can create additional records manually. The portion of the record that matches the DPL pattern is highlighted so that you can visualize the progress of your pattern.
You can currently access DPL Architect from
While using Security Investigator , there are several ways to access DPL Architect. For instructions, see Extract.
Once you open DPL Architect, you can
Use the expression editor to enter your schema pattern and start field extractions. Start typing and use the autocomplete suggestions.
Base dataset displays how many records from the original query results match your pattern.
Results displays the extracted fields as new columns if, in your pattern, you add names to the extracted fields after the colon (for example, IPADDR:client_ip
).
Select Add to preview (located to the right of the base dataset) to
You can have multiple DPL patterns opened at the same time in different tabs. This way you can
When working with multiple patterns, use these commands:
Unsaved patterns persist after closing DPL Architect and are only dismissed when you close the tabs manually.
Select Insert pattern to add the pattern to the parse command at the end of the original query.
Select Close to return to the query section, and rerun the query to see the extracted fields in the results.
DPL Architect provides a variety of preset patterns for the most popular technologies in the field, such as AWS, Microsoft, and Google Cloud.
These patterns can be
To access the preset patterns, select Saved patterns > Dynatrace patterns. For faster access, preset patterns are logically divided into a folder structure.
See below for the list of preset patterns.
Pattern
Description
apache/access
Apache HTTP servers access log pattern. See: Apache log files
apache/error-default
Apache HTTP servers error log pattern. See: Apache log files
aws/cloudfront
AWS CloudFront default log pattern. See: Standard log file fields
aws/cloudtrail
Extracts all the fields from AWS CloudTrail JSON-formatted log record. See: CloudTrail log file examples
aws/elb
Extracts all the fields from AWS Elastic Load Balancer log record. See: Access logs for your Application Load Balancer
aws/route53-query
Extracts all the fields from JSON-formatted AWS Route53 resolver query log record. See: Route 53 Resolver query log example
aws/s3-server-access
Extracts all the fields from AWS S3 server access log records. See: Amazon S3 server access log format
aws/vpc-flow-default
Extracts all the fields from the AWS VPC Flow logs default format. See: Flow log records
aws/vpc-flow-default
Extracts the fields from the AWS VPC Flow logs custom format, when all the fields have been added in the default order. See: Flow log records
gcp/scc
Extracts the relevant fields from GPC Security Command Centers' records. See: REST Resource: organizations.sources.findings
haproxy/http
Extracts all the fields from HAProxy HTTP default log records. See: HAProxy Configuration Manual
iis/default
Extracts all the fields from Microsoft IIS access logs. See: Configure Logging in IIS
k8s/audit
Extracts all the fields from JSON-formatted Kubernetes apiservers' audit log records. See: kube-apiserver Audit Configuration
k8s/coredns-query
Extracts all the fields from CoreDNS default query logs. See: CoreDNS log
Application Security
In this use case, you work with Security Investigator to analyze unauthorized requests in your Kubernetes audit logs. See how you can get a precise extraction of fields from complex data and instant feedback on your patterns about their effectiveness and coverage, without the need to re-execute queries, to find the origin of your unauthorized requests and get accurate results about what happened.
For additional insights into DPL Architect, see
Blog: Speed up your security investigations with DPL Architect
Dynatrace University tutorial: