Cyberx Documentation Release Latest

Total Page:16

File Type:pdf, Size:1020Kb

Cyberx Documentation Release Latest CyberX Documentation Release latest Aug 26, 2021 Contents 1 About 1 2 Introduction 3 2.1 Elasticsearch...............................................4 2.2 Kibana..................................................4 2.3 Logstash.................................................4 2.4 ELK...................................................5 3 Data source and application management7 3.1 Data source................................................7 3.2 System services.............................................7 3.3 First configuration steps.........................................8 3.4 First login................................................. 14 3.5 Index selection.............................................. 16 3.6 Changing default users for services................................... 17 3.7 Custom installation the CyberX..................................... 18 3.8 Plugins management in the Elasticsearch................................ 22 3.9 ROOTless management......................................... 23 3.10 CyberX Elasticsearch encryption.................................... 24 3.11 Transport layer encryption........................................ 26 3.12 HTTP layer encryption.......................................... 26 3.13 Browser layer encryption......................................... 28 3.14 Index rollover............................................... 29 3.15 Default home page............................................ 29 4 Discovery 31 4.1 Time settings and refresh......................................... 31 4.2 Fields................................................... 33 4.3 Filtering and syntax building....................................... 34 4.4 Saving and deleting queries....................................... 36 4.5 Manual incident............................................. 38 4.6 Change the default width of columns.................................. 38 5 Visualizations 41 5.1 Creating visualization.......................................... 41 5.2 Vizualization types............................................ 43 5.3 Edit visualization and saving....................................... 43 i 5.4 Dashboards................................................ 46 5.5 Sharing dashboards............................................ 47 5.6 Dashboard drilldown........................................... 48 5.7 Sound notification............................................ 52 6 Reports 55 6.1 CSV Report............................................... 56 6.2 PDF Report................................................ 59 6.3 Scheduler Report (Schedule Export Dashboard)............................. 61 7 User roles and object management 65 7.1 Users, roles and settings......................................... 65 7.2 Creating a User (Create User)...................................... 67 7.3 Create, modify and delete a role (Create Role), (Role List)....................... 68 7.4 Default user and passwords....................................... 71 7.5 Changing password for the system account............................... 72 7.6 Module Access.............................................. 73 8 Settings 75 8.1 General Settings............................................. 75 8.2 License (License Info).......................................... 77 8.3 Special accounts............................................. 78 9 Alert Module 79 9.1 Enabling the Alert Module........................................ 79 9.2 SMTP server configuration........................................ 80 9.3 Creating Alerts.............................................. 80 9.4 Alerts status............................................... 84 9.5 Alert Types................................................ 84 9.6 Alert Methods.............................................. 88 9.7 Alert Content............................................... 90 9.8 Example of rules............................................. 91 9.9 Playbooks................................................ 97 9.10 Risks................................................... 100 9.11 Incidents................................................. 106 9.12 Indicators of compromise (IoC)..................................... 112 9.13 Calendar function............................................ 113 10 SIEM Plan 115 10.1 System security.............................................. 115 10.2 Security rules............................................... 126 11 Archive 127 11.1 Configuration............................................... 127 11.2 Archive Task............................................... 127 11.3 Archive Search.............................................. 129 11.4 Archive Upload.............................................. 130 11.5 Command Line tools........................................... 131 12 Intelligence Module 133 12.1 The fixed part of the screen....................................... 135 12.2 Screen content for regressive algorithms................................. 138 12.3 Screen content for the Trend algorithm................................. 140 12.4 Screen content for the neural network (MLP) algorithm........................ 142 12.5 AI Rules List............................................... 144 ii 12.6 AI Learn................................................. 146 12.7 AI Learn Tasks.............................................. 148 12.8 Scenarios of using algorithms implemented in the Intelligence module................. 149 12.9 Scheduler Module............................................ 150 12.10 Permission................................................ 152 12.11 Register new algorithm.......................................... 152 13 Verification steps and logs 157 13.1 Verification of Elasticsearch service................................... 157 13.2 Verification of Logstash service..................................... 158 14 Building a cluster 161 14.1 Node roles................................................ 161 14.2 Naming convention............................................ 161 14.3 Config files................................................ 162 14.4 Example setup.............................................. 162 14.5 Adding a new node to existing cluster.................................. 163 14.6 Cluster HOT-WARM-COLD architecture................................ 164 15 Integration with AD 165 15.1 AD configuration............................................. 165 15.2 Configure SSL suport for AD authentication.............................. 167 15.3 Role mapping............................................... 174 15.4 Password encryption........................................... 174 16 Integration with Radius 177 16.1 Configuration............................................... 177 17 Integration with LDAP 179 17.1 Configuration............................................... 179 18 Configuring Single Sign On (SSO) 181 18.1 Configuration steps............................................ 181 18.2 Client (Browser) Configuration##.................................... 183 19 Configure email delivery 189 19.1 Configure email delivery for sending PDF reports in Scheduler..................... 189 19.2 Basic postfix configuration........................................ 192 19.3 Example of postfix configuration with SSL encryption enabled..................... 192 20 Wiki 195 20.1 Wiki.js.................................................. 195 21 API 209 21.1 Kibana API................................................ 209 21.2 Elasticsearch API............................................. 210 21.3 Elasticsearch Index API......................................... 210 21.4 Elasticsearch Document API....................................... 213 21.5 Elasticsearch Cluster API........................................ 216 21.6 Elasticsearch Search API......................................... 216 21.7 Elasticsearch - Mapping, Fielddata and Templates........................... 217 21.8 AI Module API.............................................. 219 21.9 Alert module API............................................ 228 21.10 Reports module API........................................... 230 21.11 License module API........................................... 231 iii 21.12 User Module API............................................. 232 22 Logstash 233 22.1 Logstash - Input “beats”......................................... 233 22.2 Logstash - Input “network”....................................... 235 22.3 Logstash - Input SNMP......................................... 235 22.4 Logstash - Input HTTP / HTTPS..................................... 235 22.5 Logstash - Input File........................................... 236 22.6 Logstash - Input database........................................ 236 22.7 Logstash - Input CEF........................................... 238 22.8 Logstash - Input OPSEC......................................... 238 22.9 Logstash - Input SDEE.......................................... 248 22.10 Logstash - Input XML.......................................... 249 22.11 Logstash - Input WMI.......................................... 249 22.12 Logstash - Filter “beats syslog”..................................... 250 22.13 Logstash - Filter “network”....................................... 252 22.14 Logstash - Filter “geoip”......................................... 254 22.15 Logstash avoiding duplicate documents................................. 255 22.16 Logstash data enrichment........................................ 255 22.17 Logstash - Output to Elasticsearch.................................... 260 22.18 Logstash
Recommended publications
  • Naemonbox Manual Documentation Release 0.0.7
    NaemonBox Manual Documentation Release 0.0.7 NaemonBox Team September 16, 2016 Contents 1 Introduction 3 1.1 Target audience..............................................3 1.2 Prerequisite................................................3 2 About Naemonbox 5 2.1 Project..................................................5 2.2 Features..................................................6 3 Installation Guide 7 3.1 System requirements...........................................7 3.2 Recommended system requirements...................................7 3.3 Client Operating Systems........................................7 3.4 Openvz VPS installation.........................................8 3.5 GNU/Linux Debian 7 (or later) Installation...............................8 3.6 Installing Naemonbox..........................................8 4 Getting Started 9 4.1 Step one.................................................9 4.2 Step two................................................. 10 4.3 Step three................................................. 10 4.4 Step four................................................. 10 5 Configuring Naemon 11 5.1 Introduction............................................... 11 5.2 Actions.................................................. 11 5.3 Hosts Definition............................................. 12 5.4 Services.................................................. 13 5.5 Commands................................................ 14 5.6 Time periods............................................... 15 5.7 Contacts................................................
    [Show full text]
  • Josh Malone Systems Administrator National Radio Astronomy Observatory Charlottesville, VA
    heck What the #%!@ is wrong ^ with my server?!? Josh Malone Systems Administrator National Radio Astronomy Observatory Charlottesville, VA 1 Agenda • Intro to Monitoring • Internet protocols 101 • • Nagios SMTP • IMAP • Install/Config • HTTP • Usage • Custom plugins • Packet sniffing for dummies • Intro to Troubleshooting • Tools • telnet, openssl • grep, sed • ps, lsof, netstat 2 MONITORING 3 Automated Monitoring Workflow 4 Monitoring Packages: Open Source • • Pandora FMS • Opsview Core • Naemon • • • • • • Captialware ServerStatus • Core • Sensu All Trademarks and Logos are property of their respective trademark or copyright holders and are used by permission or fair use for education. Neither the presenter nor the conference organizers are affiliated in any way with any companies mentioned here. 5 Monitoring Packages: Commercial • Nagios XI • Groundwork • PRTG network monitor • CopperEgg • WhatsUp Gold • PRTG network monitor • op5 (Naemon) All Trademarks and Logos are property of their respective trademark or copyright holders and are used by permission or fair use for education. Neither the presenter nor the conference organizers are affiliated in any way with any companies mentioned here. 6 Why Automatic Service Monitoring? • Spot small problems before they become big ones • Learn about outages before your users do • Checklist when restoring from a power outage • Gives you better problem reports than users • Problems you might never spot otherwise • Failed HDDs in RAIDs • Full /var partitions • Logs not rotating • System temperature rising 7 Why Automatic Service Monitoring? • Capacity planning • Performance data can generate graphs of utilization • RAM, Disk, etc. • Availability reports - CAUTION • Easy to generate -- even easier to generate wrong • Make sure your configurations actually catch problems • Will also include problems with Nagios itself :( • If you’re going to quote your availability numbers (SLAs, etc.) make sure you understand what you’re actually monitoring.
    [Show full text]
  • Market Impact Report Juniper Networks’ Appformix: Intent-Driven Cloud-Scale Infrastructure
    Market Impact Report Juniper Networks’ AppFormix: Intent-Driven Cloud-Scale Infrastructure EXECUTIVE SUMMARY Today, we live in a cloud-centric world with cloud-native applications and services reaching hundreds of millions of users globally via massive data centers located KEY FEATURES around the world. Until recently, the cloud has been the domain of a relatively • Autonomous, intent-driven small number of web-scale giants, cloud computing platforms, cloud-native infrastructure operation for businesses and global software companies. However, enterprises are now workload and resource migrating IT applications to hybrid clouds and network service providers are optimization reducing costs and increasing service agility by deploying cloud-scale platforms to • Smart agents streamline support Network Functions Virtualization (NFV). infrastructure monitoring by applying machine learning to Cloud-scale infrastructure presents significant operational challenges that arise metrics local to each node because of the massive scale, software-driven complexity and highly dynamic nature of applications deployed in run-time environments supported by the • Analytics modules monitor Docker, Kubernetes and Openstack frameworks, in which workloads and SLAs and correlate anomalies and events across the entire resources fluctuate constantly. infrastructure Traditional monitoring solutions rooted in legacy infrastructure are not well • Policy-driven controller suited to the real-time, full stack monitoring requirements of today’s cloud-scale assures pre-defined
    [Show full text]
  • Examensarbete Nätverksövervakning
    Examensarbete Nätverksövervakning En jämförelse av Sensu och op5 Monitor Författare: Kristoffer NILSSON & Ashour SHAMOUN Handledare: Marcus WILHELMSSON Examinator: Jacob LINDEHOFF Termin: VT2014 Ämne: Datavetenskap Nivå: G1E Kurskod: 1DV41E Sammanfattning Rapporten beskriver arbetet och resultaten av en jämförelse mellan Sensu och op5 Monitor, vilka är verktyg som används för att övervaka enheter i nätverk, så kallade network monitoring systems. Arbetet har utförts för att utbudet av nätverksövervak- ningsverktyg ständigt växer och det ansågs värdefullt att jämföra en ny aktör med ett äldre verktyg som är byggd på ett annat tankesätt. Det som ansågs intressant att testa var hur dessa verktyg hanterade de rapporter som skapades och samlades in, om det slutgiltiga resultatet från detta skulle skilja sig åt eller inte. För att testa detta sattes en virtuell testmiljö upp, där Sensu och op5 Monitor rullade parallellt med varandra och övervakade samma system och använde sig utav samma plugin för övervakningen. Experimenten utfördes på två stycken tjänster, BIND9 samt Apache2, i och med att de två pluginen som användes var uppbyggda på olika sätt konstruerades även olika experiment. Under dessa experiment samlades information in om hur de två över- vakningsverktygen hanterade de rapporter de fick in, vilket sedan sammanställdes och analyserades. Slutsatsen av det hela var att Sensu och op5 Monitor hanterar sina insamlade rapporter på ett likvärdigt sätt, de rapporterade resultaten blev i samtliga fall detsamma, således fungerade de två övervakningsverktygen på ett jämgott vis. Nyckelord: Sensu, op5 monitor, Nagios, nätverksövervakning, nms Abstract The report describes the work and results of a comparison between Sensu and op5 Monitor, which are both tools used to monitor devices in a network, more commonly known as network monitoring systems.
    [Show full text]
  • Forcepoint Appliances Command Line Interface (CLI) Guide
    Forcepoint Appliances Command Line Interface (CLI) Guide V Series, X Series, & Virtual Appliances v8.4.x ©2018, Forcepoint All rights reserved. 10900-A Stonelake Blvd, Quarry Oaks 1, Suite 350, Austin TX 78759 Published 2018 Forcepoint and the FORCEPOINT logo are trademarks of Forcepoint. Raytheon is a registered trademark of Raytheon Company. All other trademarks used in this document are the property of their respective owners. This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine- readable form without prior consent in writing from Forcepoint. Every effort has been made to ensure the accuracy of this manual. However, Forcepoint makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice. Contents Topic 1 Forcepoint Appliances Command Line Interface . .1 Conventions . .1 Logon and authentication . .2 CLI modes and account privileges . .2 Basic account management . .3 Command syntax. .9 Help for CLI commands . .9 System configuration . .10 Time and date . .11 Host name and description . .14 User certificates. .15 Filestore definition and file save commands. .16 Appliance interface configuration. .18 Appliance vswitch configuration . .29 Content Gateway Decryption Port Mirroring (DPM) . .29 Static routes. .31 Appliance status . .35 SNMP monitoring (polling) . .35 SNMP traps and queries . .38 Module-specific commands .
    [Show full text]
  • Monitoring Im 21. Jahrhundert
    Monitoring im 21. Jahrhundert Sebastian ‘tokkee’ Harl <[email protected]> collectd core developer Grazer Linuxtage 2014 04. April 2014 Graz • Wer verwendet Performance-Daten seines Monitoring-Systems? • Wer basiert (den Großteil) sein(es) Monitorings auf Performance-Daten? • Wer kennt collectd? • Wer kennt Riemann-Monitoring? Uberblick¨ • Wer verwendet Nagios/Icinga/Naemon/OpenNMS/etc.? c 2014 Sebastian ‘tokkee’ Harl Monitoring im 21. Jahrhundert – Folie 2 • Wer basiert (den Großteil) sein(es) Monitorings auf Performance-Daten? • Wer kennt collectd? • Wer kennt Riemann-Monitoring? Uberblick¨ • Wer verwendet Nagios/Icinga/Naemon/OpenNMS/etc.? • Wer verwendet Performance-Daten seines Monitoring-Systems? c 2014 Sebastian ‘tokkee’ Harl Monitoring im 21. Jahrhundert – Folie 2 • Wer kennt collectd? • Wer kennt Riemann-Monitoring? Uberblick¨ • Wer verwendet Nagios/Icinga/Naemon/OpenNMS/etc.? • Wer verwendet Performance-Daten seines Monitoring-Systems? • Wer basiert (den Großteil) sein(es) Monitorings auf Performance-Daten? c 2014 Sebastian ‘tokkee’ Harl Monitoring im 21. Jahrhundert – Folie 2 • Wer kennt Riemann-Monitoring? Uberblick¨ • Wer verwendet Nagios/Icinga/Naemon/OpenNMS/etc.? • Wer verwendet Performance-Daten seines Monitoring-Systems? • Wer basiert (den Großteil) sein(es) Monitorings auf Performance-Daten? • Wer kennt collectd? c 2014 Sebastian ‘tokkee’ Harl Monitoring im 21. Jahrhundert – Folie 2 Uberblick¨ • Wer verwendet Nagios/Icinga/Naemon/OpenNMS/etc.? • Wer verwendet Performance-Daten seines Monitoring-Systems? • Wer basiert (den Großteil) sein(es) Monitorings auf Performance-Daten? • Wer kennt collectd? • Wer kennt Riemann-Monitoring? c 2014 Sebastian ‘tokkee’ Harl Monitoring im 21. Jahrhundert – Folie 2 Uberblick¨ Warum Monitoring auf Performance-Daten basieren? Umdenken: Was passiert?“ statt Wie ist der Status?“ ” ” • Mehr Information als f OK, WARNING, CRIT g • Push statt Poll → besser skalierbar • Einfache(re) Aggregierung → z.B.
    [Show full text]
  • Automated System Monitoring
    Automated System Monitoring Josh Malone Systems Administrator [email protected] National Radio Astronomy Observatory Charlottesville, VA https://blogs.nrao.edu/jmalone 2 One night, about 8 or 9 years ago, the chiller in our DC failed. Co-worker arrive in the morning to find room was 90F ambient. Quickly set up fans to vent the room. Checked servers - found that main web server had lost both disks in its OS RAID mirror. (15k disks, ran hot) Main page was being served from memory, but the OS was freaking out. We had minimal monitoring scripts. No environment monitoring. No disk health checks. Failure caught us completely by surprise. We decided that we weren’t going to let this happen ever again. Over the next year or so we implemented 2 independent monitoring systems - one for servers/ services and one for environmentals. Set up each system to also monitor the other. WHAT IS AUTOMATED MONITORING? 7 Some sort of dedicated, automatic instrumentation to check services and/or servers Detect and report service problems, server hardware issues Usually provides a central “dashboard” to track problems Can be distributed; but still under control of a central daemon * Diferentiates it from “a bunch of scripts” used to check on things; that doesn’t have the ability to determine cause or eliminate false alarms. Automated Monitoring Workflow 8 Most packages implement this type of workflow Not all packages provide event handlers ack’ing page is important - let’s other admins know that someone is working on the problem so they don’t step on each other’s toes Monitoring Packages: Open Source • • Pandora FMS • Opsview Core • Naemon • • • • • • Captialware ServerStatus • Core • Sensu All Trademarks and Logos are property of their respective trademark or copyright holders and are used by permission or fair use for education.
    [Show full text]
  • Mysecureshell Documentation Release 1.33 Pierre Mavro
    MySecureShell Documentation Release 1.33 Pierre Mavro & Sebastien Tardif November 28, 2016 Contents 1 Introduction 3 2 Quick Try 5 3 Installation 13 4 Configuration 21 5 Usages 61 6 Frequently Asked Questions 67 7 Contribute 71 8 Third Party and Others 75 i ii MySecureShell Documentation, Release 1.33 Contents 1 MySecureShell Documentation, Release 1.33 2 Contents CHAPTER 1 Introduction 1.1 What is MySecureShell? MySecureShell is a solution which has been made to bring more features to sftp/scp protocol given by OpenSSH. By default, OpenSSH brings a lot of liberty to connected users which imply to thrust in your users. The goal of MySecureShell is to offer the power and security of OpenSSH, with enhanced features (like ACL) to restrict connected users. MySecureShell was created because of the lack of file transfer features in OpenSSH. OpenSSH was not designed as a file transfer solution, that’s why we made MySecureShell. MySecureShell is not a patch for OpenSSH, it’s a shell for users. It has the advantage to: • Avoid including security holes in OpenSSH • No dependency on against an OpenSSH version • No OpenSSH recompilation is required So MySecureShell remains easy to install, secure and easy to configure. 1.2 Why SFTP and not FTP? If you’re wondering why you should take MySecureShell as an SFTP server instead of a classical FTP, there are several reasons: 1. You do not have to open some dedicated firewall ports for file transfers 2. You are using one of the most used and secure protocol (SSH) 3. You do not have to manage SSL certificates to guaranty the security 4.
    [Show full text]
  • Using XMPP for System Monitoring and Administration
    Die approbierte Originalversion dieser Diplom-/ Masterarbeit ist in der Hauptbibliothek der Tech- nischen Universität Wien aufgestellt und zugänglich. http://www.ub.tuwien.ac.at The approved original version of this diploma or master thesis is available at the main library of the Vienna University of Technology. http://www.ub.tuwien.ac.at/eng Using XMPP for System Monitoring and Administration DIPLOMARBEIT zur Erlangung des akademischen Grades Mag.rer.soc.oec. im Rahmen des Studiums Informatikmanagement eingereicht von Adi Kriegisch Matrikelnummer 9625495 an der Fakultät für Informatik der Technischen Universität Wien Betreuung: Univ.-Prof. Dipl.-Ing. Dr. Werner Purgathofer Wien, 15.11.2015 (Unterschrift Verfasser) (Unterschrift Betreuung) Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Using XMPP for System Monitoring and Administration MASTER’S THESIS submitted in partial fulfillment of the requirements for the degree of Mag.rer.soc.oec. in Informatics Management by Adi Kriegisch Registration Number 9625495 to the Faculty of Informatics at the Vienna University of Technology Advisor: Univ.-Prof. Dipl.-Ing. Dr. Werner Purgathofer Vienna, 15.11.2015 (Signature of Author) (Signature of Advisor) Technische Universität Wien A-1040 Wien Karlsplatz 13 Tel. +43-1-58801-0 www.tuwien.ac.at Erklärung zur Verfassung der Arbeit Adi Kriegisch Leystrasse 23/11/27, 1200 Wien Hiermit erkläre ich, dass ich diese Arbeit selbständig verfasst habe, dass ich die verwende- ten Quellen und Hilfsmittel vollständig angegeben habe und dass ich die Stellen der Arbeit - einschließlich Tabellen, Karten und Abbildungen -, die anderen Werken oder dem Internet im Wortlaut oder dem Sinn nach entnommen sind, auf jeden Fall unter Angabe der Quelle als Ent- lehnung kenntlich gemacht habe.
    [Show full text]
  • Mysecureshell Documentation Release 1.33
    MySecureShell Documentation Release 1.33 Pierre Mavro & Sebastien Tardif Dec 10, 2018 Contents 1 Introduction 3 2 Quick Try 5 3 Installation 11 4 Configuration 19 5 Usages 65 6 Frequently Asked Questions 71 7 Contribute 75 8 Third Party and Others 81 i ii MySecureShell Documentation, Release 1.33 Contents 1 MySecureShell Documentation, Release 1.33 2 Contents CHAPTER 1 Introduction 1.1 What is MySecureShell? MySecureShell is a solution which has been made to bring more features to sftp/scp protocol given by OpenSSH. By default, OpenSSH brings a lot of liberty to connected users which imply to trust in your users. The goal of MySecureShell is to offer the power and security of OpenSSH, with enhanced features (like ACL) to restrict connected users. MySecureShell was created because of the lack of file transfer features in OpenSSH. OpenSSH was not designed as a file transfer solution, that’s why we made MySecureShell. MySecureShell is not a patch for OpenSSH, it’s a shell for users. It has the advantage to: • Avoid including security holes in OpenSSH • No dependency on against an OpenSSH version • No OpenSSH recompilation is required So MySecureShell remains easy to install, secure and easy to configure. 1.2 Why SFTP and not FTP? If you’re wondering why you should take MySecureShell as an SFTP server instead of a classical FTP, there are several reasons: 1. You do not have to open some dedicated firewall ports for file transfers 2. You are using one of the most used and secure protocol (SSH) 3. You do not have to manage SSL certificates to guaranty the security 4.
    [Show full text]
  • Graphite Documentation Release 1.2.0
    Graphite Documentation Release 1.2.0 Chris Davis Apr 19, 2021 Contents 1 Overview 1 2 FAQ 3 3 Installing Graphite 7 4 The Carbon Daemons 35 5 Feeding In Your Data 39 6 Getting Your Data Into Graphite 41 7 Administering Carbon 43 8 Administering The Webapp 45 9 Using The Composer 47 10 The Render URL API 49 11 The Metrics API 71 12 Functions 73 13 The Dashboard User Interface 105 14 The Whisper Database 113 15 The Ceres Database 117 16 Alternative storage finders 121 17 Graphite Events 125 18 Graphite Tag Support 129 19 Graphite Terminology 137 20 Tools That Work With Graphite 139 i 21 Working on Graphite-web 145 22 Client APIs 147 23 Who is using Graphite? 149 24 Release Notes 151 25 Indices and tables 207 Python Module Index 209 Index 211 ii CHAPTER 1 Overview 1.1 What Graphite is and is not Graphite does two things: 1. Store numeric time-series data 2. Render graphs of this data on demand What Graphite does not do is collect data for you, however there are some tools out there that know how to send data to graphite. Even though it often requires a little code, sending data to Graphite is very simple. 1.2 About the project Graphite is an enterprise-scale monitoring tool that runs well on cheap hardware. It was originally designed and written by Chris Davis at Orbitz in 2006 as side project that ultimately grew to be a foundational monitoring tool. In 2008, Orbitz allowed Graphite to be released under the open source Apache 2.0 license.
    [Show full text]
  • Appliance CLI Guide
    TRITON® Appliances Command Line Interface (CLI) Guide V-Series, X-Series, & Virtual Appliances v8.3.x ©1996–2016, Forcepoint LLC 10900-A Stonelake Blvd, Quarry Oaks 1, Suite 350, Austin, TX 78759, USA All rights reserved. Published 2017 Revision C Printed in the United States and Ireland R170417830 The products and/or methods of use described in this document are covered by U.S. Patent Numbers 5,983,270; 6,606,659; 6,947,985; 7,185,015; 7,194,464 and RE40,187 and other patents pending. This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine- readable form without prior consent in writing from Forcepoint LLC. Every effort has been made to ensure the accuracy of this manual. However, Forcepoint LLC, makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Forcepoint LLC shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this documentation is subject to change without notice. Trademarks Forcepoint is a registered trademark and TRITON is a trademark of Forcepoint LLC, in the United States and certain international markets. Forcepoint has numerous other unregistered trademarks in the United States and internationally. All other trademarks are the property of their respective owners. Microsoft, Windows, Windows NT, Windows Server, and Active Directory are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
    [Show full text]