Skip to content

Quickstart

Drowning in logs, alerts, and rigid tools? Meet Tenzir—your engine for taming security data. In just a few minutes, you’ll be ingesting, transforming, and enriching data on your terms, with full control.

Here’s what you’ll accomplish:

  1. Use Tenzir instantly
  2. Deploy your first pipeline
  3. See results in action

You need zero infrastructure to get started—just a browser and access to
app.tenzir.com.

It helps if you have basic familiarity with logs or security telemetry, but it’s not required.

Your First Pipeline: Ingest, Filter, Import

Section titled “Your First Pipeline: Ingest, Filter, Import”

Let’s walk through a pipeline that reads a sample log file, filters out unnecessary events, and stores the results in the node’s edge storage.

End-to-End Use Case: Collect, Normalize, Enrich, Optimize, Route

Section titled “End-to-End Use Case: Collect, Normalize, Enrich, Optimize, Route”

Step 3: Enrich Events with Threat Intelligence

Section titled “Step 3: Enrich Events with Threat Intelligence”

Step 4: Cut Out Noise, Forward Detection Findings

Section titled “Step 4: Cut Out Noise, Forward Detection Findings”

You’ve just scratched the surface. Here’s where to go next:

  1. Deploy your own node
  2. Visualize pipeline insights and build dashboards
  3. Map your logs to OCSF
  4. Send enriched data to your data lake

Need help? Join us on the Tenzir Discord. Curious how it all fits together? Head over to the architecture overview.