This document describes all the operators provided by Nightfall to perform search operations on the Violations page. You can use these operators to search for specific violations.
Nightfall provides you with two types of operators which are described in the following sections.
annotation_comment
This operator allows you to filter violations using the annotation comments.
annotation_type
confidence
This operator allows you to filter violations using the Confidence level which can either be Possible, likely, or Very Likely.
detection_rule_id
This operator allows you to filter violations using the unique detection rule ID.
detector_id
This operator allows you to filter violations using the unique detector ID.
file_name
This operator allows you to filter violations using the name of the file that triggered the violated
file_type
This operator allows you to filter violations using the type of file that triggered the violation.
integration_name
This operator allows you to filter violations using the integration name.
policy_id
This operator allows you to filter violations using the unique ID of the policy.
policy_name
This operator allows you to filter violations using the name of the policy.
post_context
pre_context
quote
This operator allows you to filter violations using the quote.
user_email
This operator allows you to filter violations using the
user_name
This operator allows you to filter violations using the name of the user who triggered the violation.
violation_id
This operator allows you to filter violations using the unique ID of the violation.
This operator allows you to filter violations using the Confluence page's parent page name in which the violation was discovered.
This operator allows you to filter violations using Confluence's space name in which the violation was discovered.
This operator allows you to filter violations using the Email ID of the GitHub user who triggered the violation.
This operator allows you to filter violations using the name of the GitHub branch in which the violation was triggered.
This operator allows you to filter violations using the GitHub commit ID in which the violation was discovered.
This operator allows you to filter violations using the GitHub organization name in which the violation was discovered.
This operator allows you to filter violations using the GitHub repository name in which the violation was discovered.
This operator allows you to filter violations using the name of the GitHub repository owner in which the violation was discovered.
This operator allows you to filter violations using the name of the JIRA project in which the violation was discovered.
This operator allows you to filter violations using the ticket number of the JIRA in which the violation was discovered.
This operator allows you to filter violations using the name of the user who created the notion page in which the violation was discovered.
This operator allows you to filter violations using the name of the user who last edited the notion page in which the violation was discovered.
This operator allows you to filter violations using the title of the page in which the violation was discovered.
This operator allows you to filter violations using the name of the Notion workspace in which the violation was discovered.
This operator allows you to filter violations using the ID of the Slack channel in which the violation was discovered.
This operator allows you to filter violations using the name of the Slack channel in which the violation was discovered.
This operator allows you to filter violations using the name of the Slack Workspace in which the violation was discovered.
This operator allows you to filter violations using the name of the channel in which the violation was discovered.
This operator allows you to filter violations using the channel type name in which the violation was discovered.
This operator allows you to filter violations using the name of the sender who triggered the violation.
This operator allows you to filter violations using the name of the team in which the violation occured.
This operator allows you to filter violations using the name of the current user who triggered the violation.
This operator allows you to filter violations using the name of the group to which the violation ticket is assigned.
This operator allows you to filter violations using the Zendesk ticket status.
This operator allows you to filter violations using the name of the Ticket.
This operator allows you to filter violations using the type of annotation. Nightfall provides three types of annotations. To learn more about annotations, see