Dive right in for free at app.tenzir.com and explore the cloud-based Tenzir demo. When you're ready for deploying your own node, run our installer that guides your through setup process:
curl https://get.tenzir.app | sh
Tenzir processes and stores data security event data using pipelines, nodes, and the platform:
- Pipeline: A dataflow of operators for producing, transforming, and
consuming data. The
tenzir
binary runs a pipeline. - Node: Hosts concurrently running pipelines. A node also has a
storage engine with a thin layer of indexing on top of raw Parquet/Feather
partitions. The
tenzir-node
binary spawns a node. - Platform: Manages nodes and account user data. Nodes connect to the platform and you can manage them through app.tenzir.com.
Check out our documentation for detailed setup instructions, user guides, and reference material.
Use Tenzir if you want to:
- Filter, shape, and enrich events before they hit your SIEM or data lake
- Normalize, enrich, aggregate, and deduplicate structured event data
- Store, compact, and search event data in an open storage format
- Operationalize threat intelligence for live and retrospective detection
- Build your own security data lake and need an ETL layer
- Create a federated detection and response architectures
The majority of our code is open source and comes with a BSD 3-clause license. Visit https://tenzir.com/pricing for commercial editions and read the FAQs for further details.