Detection Engineering
Translate Sigma detection rules into SQL and evaluate them continuously over Kafka log streams. RisingWave runs hundreds of detection rules in parallel as materialized views, surfacing matches in real time without waiting for a SIEM to index logs.
Why Streaming Evaluation
Sigma rules are written for SIEM search languages like SPL or KQL, which operate on indexed log data. Indexing introduces minutes of latency between a log event and rule evaluation. Translating Sigma rules to SQL and running them in RisingWave over Kafka streams evaluates the same detection logic against every event as it arrives, eliminating the indexing latency entirely.
| Factor | SIEM-Based Sigma | RisingWave |
|---|---|---|
| Evaluation Latency | Minutes (after SIEM index) | Milliseconds (per-event) |
| Rule Language | SPL, KQL, Sigma YAML | Standard SQL |
| Rule Throughput | Sequential SIEM search | Parallel materialized views |
| Infrastructure | Log shipper + SIEM cluster | Kafka + RisingWave |
Use Cases
Sigma rules that detect event sequences, frequency thresholds, or cross-source correlations benefit most from streaming evaluation. These patterns require stateful computation that SQL window aggregations and stream-table joins handle natively, without the stateless search approach that SIEM tools use.
Sigma rules detecting suspicious process execution patterns translate to SQL filters over endpoint telemetry streams from Kafka. Evaluate parent-child process relationships, suspicious command-line arguments, and execution paths as rows arrive without log indexing
Brute force and credential stuffing Sigma rules map to SQL COUNT aggregations with OVER time windows. Run authentication failure threshold rules continuously over Active Directory and Okta event streams, triggering on the exact event that crosses the threshold
Sigma rules detecting outbound connections to suspicious ports or IP ranges translate to SQL filters with stream-table joins against threat intelligence tables updated in real time via CDC. New threat intel entries take effect within seconds
Multi-event Sigma rules detecting lateral movement sequences translate to SQL session window aggregations that correlate authentication events across hosts within a time bound, surfacing the pattern without waiting for all events to be indexed
How It Works
Each Sigma rule translates to a SQL SELECT statement or materialized view in RisingWave. The Sigma condition block becomes a SQL WHERE clause. Time-bound aggregations in Sigma become SQL window functions. The Sigma detection timeframe becomes a window interval. Once translated, the rule runs continuously over the Kafka source stream as an incremental view.
Translate Sigma rules to SQL and run them continuously over Kafka log streams without waiting for a SIEM to index your logs.
Start Free