ITRS-Log-Analytics-7.x User Guide¶
- Data source and application management
- Data source
- System services
- First configuration steps
- First login
- Index selection
- Changing default users for services
- Custom installation the ITRS Log Analytics
- Plugins management in the Elasticsearch
- ROOTless management
- ITRS Log Analytics Elasticsearch encryption
- Transport layer encryption
- HTTP layer encryption
- Intelligence Module
- The fixed part of the screen
- Screen content for regressive algorithms
- Screen content for the Trend algorithm
- Screen content for the neural network (MLP) algorithm
- AI Rules List
- AI Learn
- AI Learn Tasks
- Scenarios of using algorithms implemented in the Intelligence module
- Scheduler Module
- Permission
- Register new algorithm
- Logstash
- Logstash - Input “beats”
- Logstash - Input “network”
- Logstash - Input SNMP
- Logstash - Input HTTP / HTTPS
- Logstash - Input File
- Logstash - Input database
- Logstash - Filter “beats syslog”
- Logstash - Filter “network”
- Logstash - Filter “geoip”
- Logstash - Output to Elasticsearch
- Logstash plugin for “naemon beat”
- Logstash plugin for “perflog”
- Single password in all Logstash outputs
- Secrets keystore for secure settings
- Enabling encryption for Apache Kafka clients
- Integrations
- OP5 - Naemon logs
- OP5 - Performance data
- OP5 Beat
- The Grafana instalation
- The Beats configuration
- Wazuh integration
- BRO integration
- 2FA authorization with Google Auth Provider (example)
- Cerebro - Elasticsearch web admin tool
- Curator - Elasticsearch index management tool
- Cross-cluster Search
- Sync/Copy
- XLSX Import
- Logtrail