Data Analytics
Panther's Data Analytics allow for freely searching collected and normalized log data using SQL via Snowflake and AWS Athena.
This is necessary for investigations, baselining behaviors, writing rules, and generating analytics on logs in the context of days, weeks, or months of data.
Panther performs data normalization and processing to store the log data in a standard and efficient way in S3.
Additionally, other applications that can read data from S3 can access this data for search, business intelligence, redundancy, or anything else.

Available Databases

The following databases are available:
All data sent via Log Analysis, organized by log type. This is the main Panther database, holding parsed records of all the onboarded log types. The number and size of the tables here will vary depending on the sources you onboard. See a few sample queries here
Events for all triggered alerts, organized by log type. For every onboarded source that appears in a rule match, Panther creates a row in the corresponding table in the rule matches database. This allows for an easy historical view over what rules are firing and why.
Events for all errors from rules (e.g., Python tracebacks) rect code or permissions issues, a rule returns an error, and does not complete its run successfully. The rule errors tables keep track of any such events, for easy debugging.
Standardized fields across all logs and rule matches.
Panther cloud security scanning data.
panther_monitor (Snowflake only)
Panther data loader self-monitoring. Panther Monitor contains information about the data load process into Panther's Snowflake database itself. See the Snowflake Backend section for more details on this.

Panther Views

Panther Views bring together common data fields that enable you to search across multiple data sources at once.
The following views are available:
Search all data (logs, rule matches and errors)
Search all log data
Search all cloud security data. The Panther Cloud Security Database stores AWS configuration information and changes detected from the scans on the monitored environments.
Search all events matching rules
Search all events causing rule errors