Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 23 Next »

The Data Sources section of Manager is where you can create your Data Sources using the Source Builder.

 


Authorization Requirements: You must have administrative permissions in order to use the Manager.


 

Some of the visualizations that ship with Information Security Analytics require additional data processing jobs to be executed from the platform. An IKANOW resource is required to execute these map reduce jobs before your data will appear in the visualizations.

SourceSource Name/LinkDescription
Logstash Import SourceA lighter weight IKANOW object format for storing logs, term/record volumes, or statistics. A very common use case for logs/records is in Dev. Ops environments where log files need to be filtered and appropriately analyzed. Using the IKANOW record format it is easy to filter log files, define column names, and determine geo ip information for example. This record data can then be analyzed along with other IKANOW documents for log analysis and big data cyber analytics within one platform.
RSS with NLP

You can use the Information Security Analytics Manager to connect to an RSS feed as an input source.

 

Web pages with NLPExtracts documents from lists of URLs.
Yahoo Search APIYou can use the Information Security Analytics Manager to connect to the Yahoo Search API. Provides a rich set of premium data APIs and tools that developers and entrepreneurs can use to build custom search engines and innovative experiences.
Datasift from S3

Datasift is an aggregation service that streams and enriches tweets, posts, blogs, and news from a variety of social media and other Internet sources.

Twitter Search APIThe Twitter Search API is part of Twitter’s REST API. It allows queries against the indices of recent or popular Tweets and behaves similarly to, but not exactly like the Search feature available in Twitter mobile or web clients.
Lookup table builder

You can use the Information Security Analytics Manager to build a lookup table in the Information Security Analytics platform.  Building a lookup table describes the process of indicating the JSON share where the lookup table is located, and specifying the Key Field and Header Fields in your lookup table.

Once the lookup table is built it can be loaded at harvest time to specify a global set of variables that can be used to simplify the process of generating metadata using Javascripting.  

Lookup table applierYou can use the Information Security Analytics Manager to apply a previously created lookup table.  Applying a lookup table describes the process of indicating the lookup table name to apply, as well as the Data Group to apply the lookup table, and the record type (eg. Apache).  
Advanced Source BuilderYou can use the Advanced source builder to edit the raw JSON of the Source Pipeline Elements directly in the browser. 

 

 

 

  • No labels