Quickstart
Drowning in logs, alerts, and rigid tools? Meet Tenzir—your engine for taming security data. In just a few minutes, you’ll be ingesting, transforming, and enriching data on your terms, with full control.
Here’s what you’ll accomplish:
- Use Tenzir instantly
- Deploy your first pipeline
- See results in action
Prerequisites
Section titled “Prerequisites”You need zero infrastructure to get started—just a browser and access to
app.tenzir.com.
It helps if you have basic familiarity with logs or security telemetry, but it’s not required.
Setup & Run Tenzir
Section titled “Setup & Run Tenzir”Your First Pipeline: Ingest, Filter, Import
Section titled “Your First Pipeline: Ingest, Filter, Import”Let’s walk through a pipeline that reads a sample log file, filters out unnecessary events, and stores the results in the node’s edge storage.
End-to-End Use Case: Collect, Normalize, Enrich, Optimize, Route
Section titled “End-to-End Use Case: Collect, Normalize, Enrich, Optimize, Route”Step 1: Ingest Sample Logs
Section titled “Step 1: Ingest Sample Logs”Step 2: Normalize Logs to OCSF
Section titled “Step 2: Normalize Logs to OCSF”Step 3: Enrich Events with Threat Intelligence
Section titled “Step 3: Enrich Events with Threat Intelligence”Step 4: Cut Out Noise, Forward Detection Findings
Section titled “Step 4: Cut Out Noise, Forward Detection Findings”Step 5: Quantify Your Volume Reduction
Section titled “Step 5: Quantify Your Volume Reduction”What’s Next?
Section titled “What’s Next?”You’ve just scratched the surface. Here’s where to go next:
- Deploy your own node
- Visualize pipeline insights and build dashboards
- Map your logs to OCSF
- Send enriched data to your data lake
Need help? Join us on the Tenzir Discord. Curious how it all fits together? Head over to the architecture overview.