Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The Data Sources section of Manage is where you can create your Data Sources using the Source Builder.  Test 

 

...

Authorization Requirements: You must have administrative permissions in order to use the Manager.

...

SourceSource Name/LinkDescription
Image RemovedImage AddedLogstash Import SourceA lighter weight IKANOW object format for storing logs, term/record volumes, or statistics. A very common use case for logs/records is in Dev. Ops environments where log files need to be filtered and appropriately analyzed. Using the IKANOW record format it is easy to filter log files, define column names, and determine geo ip information for example. This record data can then be analyzed along with other IKANOW documents for log analysis and big data cyber analytics within one platform.
Image RemovedImage AddedRSS with NLP

You can use the Information Security Analytics Manager to connect to an RSS feed as an input source.

 

Image RemovedImage AddedWeb pages with NLPExtracts documents from lists of URLs.
Image RemovedImage AddedYahoo Search APIYou can use the Information Security Analytics Manager to connect to the Yahoo Search API. Provides a rich set of premium data APIs and tools that developers and entrepreneurs can use to build custom search engines and innovative experiences.
Image RemovedImage AddedDatasift from S3

Datasift is an aggregation service that streams and enriches tweets, posts, blogs, and news from a variety of social media and other Internet sources.

Image RemovedImage AddedTwitter Search APIThe Twitter Search API is part of Twitter’s REST API. It allows queries against the indices of recent or popular Tweets and behaves similarly to, but not exactly like the Search feature available in Twitter mobile or web clients.
Image RemovedImage AddedLookup table builder

You can use the Information Security Analytics Manager to build a lookup table in the Information Security Analytics platform.  Building a lookup table describes the process of indicating the JSON share where the lookup table is located, and specifying the Key Field and Header Fields in your lookup table.

Once the lookup table is built it can be loaded at harvest time to specify a global set of variables that can be used to simplify the process of generating metadata using Javascripting.  

Image RemovedImage AddedLookup table applierYou can use the Information Security Analytics Manager to apply a previously created lookup table.  Applying a lookup table describes the process of indicating the lookup table name to apply, as well as the Data Group to apply the lookup table, and the record type (eg. Apache).  
Image RemovedImage AddedAdvanced Source BuilderYou can use the Advanced source builder to edit the raw JSON of the Source Pipeline Elements directly in the browser. 

...