From e591b54dbb0923130ab4651ced49769cd86d7f59 Mon Sep 17 00:00:00 2001 From: Serge Smertin <259697+nfx@users.noreply.github.com> Date: Wed, 28 Feb 2024 12:36:57 +0100 Subject: [PATCH] Added tokei.rs badge [![lines of code](https://tokei.rs/b1/github/databrickslabs/transpiler)]([https://codecov.io/github/databrickslabs/transpiler](https://github.com/databrickslabs/transpiler)) --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index f9683c2..7c532ea 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,7 @@ # SPL-to-PySpark transpiler [![codecov](https://codecov.io/gh/databrickslabs/transpiler/branch/main/graph/badge.svg?token=sVMIEvUjvC)](https://codecov.io/gh/databrickslabs/transpiler) +[![lines of code](https://tokei.rs/b1/github/databrickslabs/transpiler)]([https://codecov.io/github/databrickslabs/transpiler](https://github.com/databrickslabs/transpiler)) Cybersecurity practitioners have plenty of ETL or alerting rules coded in Search Processing Language (SPL) to run within some of the industry-standard SIEM environments. In reality, only the most common commands are used the most by SIEM practitioners, and it’s possible to automatically translate them into corresponding PySpark Structured Streaming or, even later - Spark SQL so that we get the same results on the same datasets with the same query from both SIEM and Databricks. It’s also possible to use this tooling to teach PySpark equivalents to SIEM practitioners to accelerate their time-to-comfort level with Databricks Lakehouse foundations.