Violation Filter Operators
This document describes all the operators provided by Nightfall to perform search operations on the Violations page. You can use these operators to search for specific violations.
Nightfall provides you with two types of operators which are described in the following sections.
General Operators
annotation_comment
This operator allows you to filter violations using the annotation comments.
annotation_type
confidence
This operator allows you to filter violations using the Confidence level which can either be Possible, likely, or Very Likely.
detection_rule_id
This operator allows you to filter violations using the unique detection rule ID.
detector_id
This operator allows you to filter violations using the unique detector ID.
file_name
This operator allows you to filter violations using the name of the file that triggered the violated
file_type
This operator allows you to filter violations using the type of file that triggered the violation.
integration_name
This operator allows you to filter violations using the integration name.
policy_id
This operator allows you to filter violations using the unique ID of the policy.
policy_name
This operator allows you to filter violations using the name of the policy.
post_context
pre_context
quote
This operator allows you to filter violations using the quote.
user_email
This operator allows you to filter violations using the
user_name
This operator allows you to filter violations using the name of the user who triggered the violation.
violation_id
This operator allows you to filter violations using the unique ID of the violation.
Integration Operators
Confluence Operators
Confluence.parent_page_name
This operator allows you to filter violations using the Confluence page's parent page name in which the violation was discovered.
Confluence.space_name
This operator allows you to filter violations using Confluence's space name in which the violation was discovered.
GitHub Operators
GitHub.author_email
This operator allows you to filter violations using the Email ID of the GitHub user who triggered the violation.
GitHub.branch
This operator allows you to filter violations using the name of the GitHub branch in which the violation was triggered.
GitHub.commit
This operator allows you to filter violations using the GitHub commit ID in which the violation was discovered.
GitHub.org
This operator allows you to filter violations using the GitHub organization name in which the violation was discovered.
github.repository
This operator allows you to filter violations using the GitHub repository name in which the violation was discovered.
github.repository_owner
This operator allows you to filter violations using the name of the GitHub repository owner in which the violation was discovered.
JIRA Operators
jira.project_name
This operator allows you to filter violations using the name of the JIRA project in which the violation was discovered.
jira.ticket_number
This operator allows you to filter violations using the ticket number of the JIRA in which the violation was discovered.
Notion Operators
notion.created_by
This operator allows you to filter violations using the name of the user who created the notion page in which the violation was discovered.
notion.last_edited_by
This operator allows you to filter violations using the name of the user who last edited the notion page in which the violation was discovered.
Notion.page_title
This operator allows you to filter violations using the title of the page in which the violation was discovered.
notion.workspace_name
This operator allows you to filter violations using the name of the Notion workspace in which the violation was discovered.
Slack Operators
Slack.channel_id
This operator allows you to filter violations using the ID of the Slack channel in which the violation was discovered.
Slack.channel_name
This operator allows you to filter violations using the name of the Slack channel in which the violation was discovered.
slack.workspace
This operator allows you to filter violations using the name of the Slack Workspace in which the violation was discovered.
MS Teams
teams.channel_name
This operator allows you to filter violations using the name of the channel in which the violation was discovered.
teams.channel_type
This operator allows you to filter violations using the channel type name in which the violation was discovered.
teams.msg_attachment
teams.msg_importance
teams.sender
This operator allows you to filter violations using the name of the sender who triggered the violation.
teams.team_name
This operator allows you to filter violations using the name of the team in which the violation occured.
teams.team_sensitivity
Zendesk
zendesk.current_user_role
This operator allows you to filter violations using the name of the current user who triggered the violation.
zendesk.ticket_group_assignee
This operator allows you to filter violations using the name of the group to which the violation ticket is assigned.
zendesk.ticket_status
This operator allows you to filter violations using the Zendesk ticket status.
zendesk.ticket_title
This operator allows you to filter violations using the name of the Ticket.
Last updated
Was this helpful?