Table of Contents

Search

  1. Preface
  2. RulePoint
  3. RulePoint Concepts
  4. Using RulePoint
  5. RulePoint Objects
  6. Working with Topics
  7. Working with Connections
  8. Working with Sources
  9. Working with Responders
  10. Working with Responses
  11. Working with Watchlists
  12. Working with Analytics
  13. DRQL
  14. Working with Rules
  15. Working with Alerts
  16. Setting Access Controls
  17. Troubleshooting RulePoint Issues
  18. Connecting to an Ultra Messaging Application
  19. Creating an Ultra Messaging JMS Source

User Guide

User Guide

Hash Analytic

Hash Analytic

When you run a hash analytic, you use cryptographic algorithms that map each data input to a distinct hash value.
Hashing converts original data of a variable length to return a hash value of a fixed length based on the algorithm you use. The returned hash value maps to the original data. The hash value is used for further processing instead of the actual value. Supported cryptographic algorithms in RulePoint that provide the hashing function are MD2, MD5, SHA-1, SHA-256, SHA-384, and SHA-512.
The following table describes the properties of a hash analytic:
Property
Description
Name
The name of the Hash analytic. This must be a unique name.
Description
Optional. The description of the analytic.
Type
Select
Hash Analytic
.
Hash Type
The algorithm type:
  • MD2
  • MD5
  • SHA-1
  • SHA-256
  • SHA-384
  • SHA-512
Salt Value
A random value that you need to add to generate the hashed value.
Conditional Evaluation Required
Select 'true' if the result of this analytic is part of a conditional evaluation within a rule. Select 'false' if the result of this analytic can only be used for enrichment. Default is True.
Cache Duration
Total number of seconds that the result of the hash analytic will be kept cached. Default is 0.
Example
Consider a property value of an event, with string (str1) and integer (int1) as the property values of a source that you want to convert to hash analytic values. Create a hash analytic using the hash algorithm type from the user interface, and then reference the hash analytic in the rule.
To create a hash analytic, complete the following tasks:
  1. Choose the hash algorithm type, such as MD2, MD5, SHA-1, SHA-256, SHA-384, or SHA-512.
  2. Provide a salt value, if required.
  3. Select Condition Evaluation Required to True or False.
  4. Provide the Cache Duration for which the analytic result will be cached.
To convert event property values into hash values, you can create the following hash analytic rule using any one of the supported hash analytic algorithms:
when 1 hashtopic m with hashanalytic(“hello”,100) as result !="" and list2vars(result, stringhashvalue, numberhashvalue) then response with body= "value of hello value is ${ stringhashvalue } and value of number value is ${numberhashvalue}"

0 COMMENTS

We’d like to hear from you!