[{"data":1,"prerenderedAt":1907},["ShallowReactive",2],{"navigation":3,"/en/getting-started":411,"/en/getting-started-surround":1396},[4,218],{"title":5,"_path":6,"children":7},"En","/en",[8,29,35,67,77,87,105,130,148,155,162,178,190],{"title":9,"_path":10,"children":11},"Getting Started","/en/getting-started",[12,14,17,20,23,26],{"title":13,"_path":10},"Introduction",{"title":15,"_path":16},"Quick Start","/en/getting-started/quickstart",{"title":18,"_path":19},"Installation on Docker Standalone","/en/getting-started/dockerstandalone",{"title":21,"_path":22},"Installation on Docker Swarm","/en/getting-started/dockerswarm",{"title":24,"_path":25},"Installation on Windows","/en/getting-started/windows",{"title":27,"_path":28},"Installation on Linux","/en/getting-started/linux",{"title":30,"_path":31,"children":32},"Dashboard","/en/dashboard",[33],{"title":30,"_path":34},"/en/dashboard/dashboard",{"title":36,"_path":37,"children":38},"Datacollector","/en/datacollector",[39,42,45],{"title":40,"_path":41},"Data View","/en/datacollector/view",{"title":43,"_path":44},"Management","/en/datacollector/management",{"title":46,"_path":47,"children":48},"Vendors","/en/datacollector/vendors",[49,52,55,58,61,64],{"title":50,"_path":51},"Default Syslog Configuration","/en/datacollector/vendors/default",{"title":53,"_path":54},"FortiGate Syslog Configuration","/en/datacollector/vendors/fortigate-syslog",{"title":56,"_path":57},"Palo Alto Syslog Configuration","/en/datacollector/vendors/palo-alto-syslog",{"title":59,"_path":60},"Ruijie Syslog Configuration","/en/datacollector/vendors/ruijie-syslog",{"title":62,"_path":63},"Sophos Syslog Configuration","/en/datacollector/vendors/sophos-syslog",{"title":65,"_path":66},"SonicWall Syslog Configuration","/en/datacollector/vendors/sonicwall-syslog",{"title":68,"_path":69,"children":70},"Reports","/en/reports",[71,74],{"title":72,"_path":73},"Reports Views","/en/reports/view",{"title":75,"_path":76},"Scheduled Reports","/en/reports/scheduled-reports",{"title":78,"_path":79,"children":80},"Alert","/en/alert",[81,84],{"title":82,"_path":83},"Rule Management","/en/alert/rule-management",{"title":85,"_path":86},"Notification Policy","/en/alert/notification-policy",{"title":88,"_path":89,"children":90},"Hotspot","/en/hotspot",[91,93,96,99,102],{"title":13,"_path":92},"/en/hotspot/introduction",{"title":94,"_path":95},"Location","/en/hotspot/locations",{"title":97,"_path":98},"Templates","/en/hotspot/templates",{"title":100,"_path":101},"User Activity","/en/hotspot/user-stats",{"title":103,"_path":104},"Black & White List","/en/hotspot/bw-list",{"title":106,"_path":107,"children":108},"Integrations","/en/integrations",[109,112,115,118,121,124,127],{"title":110,"_path":111},"SMTP Server","/en/integrations/smtp",{"title":113,"_path":114},"SMS Provider","/en/integrations/sms",{"title":116,"_path":117},"PMS Integration","/en/integrations/pms",{"title":119,"_path":120},"LDAP Integration","/en/integrations/ldap",{"title":122,"_path":123},"API Integration","/en/integrations/api",{"title":125,"_path":126},"NTP Server Integration","/en/integrations/ntp",{"title":128,"_path":129},"Timestamp Server Integration","/en/integrations/time-stamp-server",{"title":43,"_path":131,"children":132},"/en/management",[133,136,139,142,145],{"title":134,"_path":135},"Data Management","/en/management/data-management",{"title":137,"_path":138},"Contact Management","/en/management/contact-management",{"title":140,"_path":141},"Object Management","/en/management/object",{"title":143,"_path":144},"Command Line Interface","/en/management/command-line-interface",{"title":146,"_path":147},"Disk Capacity Planning Formula","/en/management/disk-management",{"title":149,"_path":150,"children":151},"License","/en/license",[152],{"title":153,"_path":154},"License & Agents","/en/license/license",{"title":156,"_path":157,"children":158},"User Authentication","/en/user-authentication",[159],{"title":160,"_path":161},"User & Authentication ","/en/user-authentication/user-authentication",{"title":163,"_path":164,"children":165},"System","/en/system",[166,169,172,175],{"title":167,"_path":168},"Administrator Management","/en/system/administrator",{"title":170,"_path":171},"Feature Visibility","/en/system/features-visibility",{"title":173,"_path":174},"Update","/en/system/update",{"title":176,"_path":177},"System Settings","/en/system/settings",{"title":179,"_path":180,"children":181},"Practice","/en/practice",[182,185,187],{"title":183,"_path":184},"Top Bantwidth Usage","/en/practice/topbantwidthusage",{"title":183,"_path":186},"/en/practice/most-visited-websites",{"title":188,"_path":189},"Inspect Blocked Traffic","/en/practice/inspect-blocked-traffic",{"title":191,"_path":192,"children":193},"Blog","/en/blog",[194,197,200,203,206,209,212,215],{"title":195,"_path":196},"Load Balance Configuration with Docker Swarm","/en/blog/load-balance-config",{"title":198,"_path":199},"Getting Started with the AI Module","/en/blog/ai-module",{"title":201,"_path":202},"How To Config Fortigate Syslog","/en/blog/how-to-config-fortigate-syslog",{"title":204,"_path":205},"How To Config Paloalto Syslog","/en/blog/how-to-config-paloalto-syslog",{"title":207,"_path":208},"How To Config Sophos Syslog","/en/blog/how-to-config-sophos-syslog",{"title":210,"_path":211},"Installing MinIO on Linux Server","/en/blog/minio-install",{"title":213,"_path":214},"Docker Desktop On Windows","/en/blog/docker-desktop-on-windows",{"title":216,"_path":217},"Installing Docker on Ubuntu Server","/en/blog/docker-on-ubuntu-server",{"title":219,"_path":220,"children":221},"Tr","/tr",[222,242,247,275,284,293,310,333,350,356,361,375,387],{"title":223,"_path":224,"children":225},"Giriş","/tr/getting-started",[226,227,230,233,236,239],{"title":223,"_path":224},{"title":228,"_path":229},"Hızlı Başlangıç","/tr/getting-started/quickstart",{"title":231,"_path":232},"Docker Standalone Üzerine Kurulum","/tr/getting-started/dockerstandalone",{"title":234,"_path":235},"Docker Swarm Üzerinde Kurulum","/tr/getting-started/dockerswarm",{"title":237,"_path":238},"Windows'ta Kurulum","/tr/getting-started/windows",{"title":240,"_path":241},"Linux'ta Kurulum","/tr/getting-started/linux",{"title":30,"_path":243,"children":244},"/tr/dashboard",[245],{"title":30,"_path":246},"/tr/dashboard/dashboard",{"title":36,"_path":248,"children":249},"/tr/datacollector",[250,252,254],{"title":40,"_path":251},"/tr/datacollector/view",{"title":43,"_path":253},"/tr/datacollector/management",{"title":46,"_path":255,"children":256},"/tr/datacollector/vendors",[257,260,263,266,269,272],{"title":258,"_path":259},"Varsayılan Syslog Yapılandırması","/tr/datacollector/vendors/default",{"title":261,"_path":262},"FortiGate Syslog Yapılandırması","/tr/datacollector/vendors/fortigate-syslog",{"title":264,"_path":265},"Palo Alto Syslog Yapılandırması","/tr/datacollector/vendors/palo-alto-syslog",{"title":267,"_path":268},"Ruijie Syslog Yapılandırması","/tr/datacollector/vendors/ruijie-syslog",{"title":270,"_path":271},"Sophos Syslog Yapılandırması","/tr/datacollector/vendors/sophos-syslog",{"title":273,"_path":274},"SonicWall Syslog Yapılandırması","/tr/datacollector/vendors/sonicwall-syslog",{"title":68,"_path":276,"children":277},"/tr/reports",[278,281],{"title":279,"_path":280},"Rapor Görünümleri","/tr/reports/view",{"title":282,"_path":283},"Planlanmış Raporlar","/tr/reports/scheduled-reports",{"title":78,"_path":285,"children":286},"/tr/alert",[287,290],{"title":288,"_path":289},"Kural Yönetimi","/tr/alert/rule-management",{"title":291,"_path":292},"Bildirim Politikası","/tr/alert/notification-policy",{"title":88,"_path":294,"children":295},"/tr/hotspot",[296,298,301,304,307],{"title":223,"_path":297},"/tr/hotspot/introduction",{"title":299,"_path":300},"Konum","/tr/hotspot/locations",{"title":302,"_path":303},"Şablonlar","/tr/hotspot/templates",{"title":305,"_path":306},"Kullanıcı Etkinliği","/tr/hotspot/user-stats",{"title":308,"_path":309},"Kara ve Beyaz Liste","/tr/hotspot/bw-list",{"title":106,"_path":311,"children":312},"/tr/integrations",[313,315,318,321,324,327,330],{"title":110,"_path":314},"/tr/integrations/smtp",{"title":316,"_path":317},"SMS Sağlayıcı","/tr/integrations/sms",{"title":319,"_path":320},"Pms","/tr/integrations/pms",{"title":322,"_path":323},"LDAP Entegrasyonu","/tr/integrations/ldap",{"title":325,"_path":326},"API Entegrasyonu","/tr/integrations/api",{"title":328,"_path":329},"NTP Sunucu Entegrasyonu","/tr/integrations/ntp",{"title":331,"_path":332},"Zaman Damgası Sunucusu Entegrasyonu","/tr/integrations/time-stamp-server",{"title":43,"_path":334,"children":335},"/tr/management",[336,339,342,345,347],{"title":337,"_path":338},"Veri Yönetimi","/tr/management/data-management",{"title":340,"_path":341},"İletişim Yönetimi","/tr/management/contact-management",{"title":343,"_path":344},"Nesne Yönetimi","/tr/management/object",{"title":143,"_path":346},"/tr/management/command-line-interface",{"title":348,"_path":349},"Disk Kapasite Planlama Formülü","/tr/management/disk-management",{"title":149,"_path":351,"children":352},"/tr/license",[353],{"title":354,"_path":355},"Lisans ve Ajanlar","/tr/license/license",{"title":156,"_path":357,"children":358},"/tr/user-authentication",[359],{"title":156,"_path":360},"/tr/user-authentication/user-authentication",{"title":163,"_path":362,"children":363},"/tr/system",[364,367,370,372],{"title":365,"_path":366},"Yönetici Yönetimi","/tr/system/administrator",{"title":368,"_path":369},"Özellik Görünürlüğü","/tr/system/features-visibility",{"title":173,"_path":371},"/tr/system/update",{"title":373,"_path":374},"Sistem Ayarları","/tr/system/settings",{"title":179,"_path":376,"children":377},"/tr/practice",[378,381,384],{"title":379,"_path":380},"En Yüksek Bandwidth Kullanımı","/tr/practice/topbantwidthusage",{"title":382,"_path":383},"Top Bandwidth Kullanımı","/tr/practice/most-visited-websites",{"title":385,"_path":386},"Engellenen Trafiği İncele","/tr/practice/inspect-blocked-traffic",{"title":191,"_path":388,"children":389},"/tr/blog",[390,393,396,398,400,402,405,408],{"title":391,"_path":392},"Docker Swarm ile Yük Deneleme Yapılandırması","/tr/blog/load-balance-config",{"title":394,"_path":395},"AI Modülü ile Başlarken","/tr/blog/ai-module",{"title":201,"_path":397},"/tr/blog/how-to-config-fortigate-syslog",{"title":204,"_path":399},"/tr/blog/how-to-config-paloalto-syslog",{"title":207,"_path":401},"/tr/blog/how-to-config-sophos-syslog",{"title":403,"_path":404},"Minio Install","/tr/blog/minio-install",{"title":406,"_path":407},"Windows'ta Docker Desktop","/tr/blog/docker-desktop-on-windows",{"title":409,"_path":410},"Ubuntu Server'da Docker Kurulumu","/tr/blog/docker-on-ubuntu-server",{"_path":10,"_dir":412,"_draft":414,"_partial":414,"_locale":415,"title":13,"description":416,"body":417,"_type":1390,"_id":1391,"_source":1392,"_file":1393,"_stem":1394,"_extension":1395},{"_path":413,"title":9},"/en/getting-started/_dir",false,"","In today`s rapidly evolving digital landscape, enterprises face increasing challenges in monitoring, analyzing, and securing their network infrastructure. Logger emerges as a comprehensive solution, combining powerful logging capabilities, intelligent analytics, and robust hotspot management in a single platform that seamlessly operates across Windows, Linux, and Container environments.",{"type":418,"children":419,"toc":1381},"root",[420,429,561,655,718,821,827,834,838,871,877,882,1375],{"type":421,"tag":422,"props":423,"children":425},"element","h2",{"id":424},"core-capabilities",[426],{"type":427,"value":428},"text","Core Capabilities ✨",{"type":421,"tag":430,"props":431,"children":432},"u-card",{},[433,440,446],{"type":421,"tag":434,"props":435,"children":437},"h3",{"id":436},"advanced-logging-ai-powered-analytics",[438],{"type":427,"value":439},"Advanced Logging & AI-Powered Analytics 🧠",{"type":421,"tag":441,"props":442,"children":443},"p",{},[444],{"type":427,"value":445},"Logger sets new standards in network monitoring with its sophisticated log collection and analysis capabilities:",{"type":421,"tag":447,"props":448,"children":449},"u-list",{},[450],{"type":421,"tag":451,"props":452,"children":453},"ul",{},[454,466,476,481,486,491,496,501,506,516,521,526,531,536,546,551,556],{"type":421,"tag":455,"props":456,"children":457},"li",{},[458,464],{"type":421,"tag":459,"props":460,"children":461},"strong",{},[462],{"type":427,"value":463},"Universal Device Integration",{"type":427,"value":465},": Seamlessly collects logs from leading UTM devices including Fortigate, Sophos, SonicWall, and Palo Alto, as well as network infrastructure components like routers, switches, and access points.",{"type":421,"tag":455,"props":467,"children":468},{},[469,474],{"type":421,"tag":459,"props":470,"children":471},{},[472],{"type":427,"value":473},"Intelligent Log Processing",{"type":427,"value":475},": Our advanced parsing engine extracts and analyzes critical data points including:",{"type":421,"tag":455,"props":477,"children":478},{},[479],{"type":427,"value":480},"Source and Target IP addresses",{"type":421,"tag":455,"props":482,"children":483},{},[484],{"type":427,"value":485},"Hostnames and URLs",{"type":421,"tag":455,"props":487,"children":488},{},[489],{"type":427,"value":490},"Port information and protocols",{"type":421,"tag":455,"props":492,"children":493},{},[494],{"type":427,"value":495},"VPN access patterns",{"type":421,"tag":455,"props":497,"children":498},{},[499],{"type":427,"value":500},"DHCP activities",{"type":421,"tag":455,"props":502,"children":503},{},[504],{"type":427,"value":505},"MAC addresses",{"type":421,"tag":455,"props":507,"children":508},{},[509,514],{"type":421,"tag":459,"props":510,"children":511},{},[512],{"type":427,"value":513},"AI-Enhanced Security Analysis",{"type":427,"value":515},": Leverages artificial intelligence to:",{"type":421,"tag":455,"props":517,"children":518},{},[519],{"type":427,"value":520},"Interpret log entries in real-time",{"type":421,"tag":455,"props":522,"children":523},{},[524],{"type":427,"value":525},"Identify potential security threats",{"type":421,"tag":455,"props":527,"children":528},{},[529],{"type":427,"value":530},"Provide actionable insights on network behavior",{"type":421,"tag":455,"props":532,"children":533},{},[534],{"type":427,"value":535},"Analyze traffic patterns and usage trends",{"type":421,"tag":455,"props":537,"children":538},{},[539,544],{"type":421,"tag":459,"props":540,"children":541},{},[542],{"type":427,"value":543},"Secure Log Management",{"type":427,"value":545},":",{"type":421,"tag":455,"props":547,"children":548},{},[549],{"type":427,"value":550},"SHA256 encryption for all stored logs",{"type":421,"tag":455,"props":552,"children":553},{},[554],{"type":427,"value":555},"Automated daily log exports with compression",{"type":421,"tag":455,"props":557,"children":558},{},[559],{"type":427,"value":560},"Free TÜBİTAK KAMUSM timestamp certification (compliant with Law No. 5651)",{"type":421,"tag":430,"props":562,"children":565},{"className":563},[564],"mt-4",[566,572],{"type":421,"tag":434,"props":567,"children":569},{"id":568},"comprehensive-reporting-analysis",[570],{"type":427,"value":571},"Comprehensive Reporting & Analysis 📶",{"type":421,"tag":447,"props":573,"children":574},{},[575],{"type":421,"tag":451,"props":576,"children":577},{},[578,587,592,597,602,607,616,621,626,631,640,645,650],{"type":421,"tag":455,"props":579,"children":580},{},[581,586],{"type":421,"tag":459,"props":582,"children":583},{},[584],{"type":427,"value":585},"Aggregate Intelligence",{"type":427,"value":545},{"type":421,"tag":455,"props":588,"children":589},{},[590],{"type":427,"value":591},"Combines log data to generate insightful summary reports",{"type":421,"tag":455,"props":593,"children":594},{},[595],{"type":427,"value":596},"Tracks user-specific bandwidth consumption",{"type":421,"tag":455,"props":598,"children":599},{},[600],{"type":427,"value":601},"Monitors VPN session durations",{"type":421,"tag":455,"props":603,"children":604},{},[605],{"type":427,"value":606},"Analyzes blocked request patterns",{"type":421,"tag":455,"props":608,"children":609},{},[610,615],{"type":421,"tag":459,"props":611,"children":612},{},[613],{"type":427,"value":614},"AI-Powered Reporting",{"type":427,"value":545},{"type":421,"tag":455,"props":617,"children":618},{},[619],{"type":427,"value":620},"Natural language interpretation of complex reports",{"type":421,"tag":455,"props":622,"children":623},{},[624],{"type":427,"value":625},"Automated insights generation",{"type":421,"tag":455,"props":627,"children":628},{},[629],{"type":427,"value":630},"Trend analysis and pattern recognition",{"type":421,"tag":455,"props":632,"children":633},{},[634,639],{"type":421,"tag":459,"props":635,"children":636},{},[637],{"type":427,"value":638},"Object-Focused Analysis",{"type":427,"value":545},{"type":421,"tag":455,"props":641,"children":642},{},[643],{"type":427,"value":644},"Unified view of all reports related to specific objects",{"type":421,"tag":455,"props":646,"children":647},{},[648],{"type":427,"value":649},"Detailed traffic analysis for individual domains or services",{"type":421,"tag":455,"props":651,"children":652},{},[653],{"type":427,"value":654},"Custom report generation for specific network entities",{"type":421,"tag":430,"props":656,"children":658},{"className":657},[564],[659,665,670],{"type":421,"tag":434,"props":660,"children":662},{"id":661},"enterprise-grade-hotspot-management",[663],{"type":427,"value":664},"Enterprise-Grade Hotspot Management 🛜",{"type":421,"tag":441,"props":666,"children":667},{},[668],{"type":427,"value":669},"Secure and flexible authentication options for Wi-Fi networks:",{"type":421,"tag":671,"props":672,"children":674},"u-tab",{"name":673},"Authentication Methods",[675],{"type":421,"tag":451,"props":676,"children":677},{},[678,683,688,693,698,703,708,713],{"type":421,"tag":455,"props":679,"children":680},{},[681],{"type":427,"value":682},"National ID verification",{"type":421,"tag":455,"props":684,"children":685},{},[686],{"type":427,"value":687},"SMS verification",{"type":421,"tag":455,"props":689,"children":690},{},[691],{"type":427,"value":692},"Captive Portal authentication",{"type":421,"tag":455,"props":694,"children":695},{},[696],{"type":427,"value":697},"LDAP integration",{"type":421,"tag":455,"props":699,"children":700},{},[701],{"type":427,"value":702},"Social Media authentication",{"type":421,"tag":455,"props":704,"children":705},{},[706],{"type":427,"value":707},"Branded authentication screens",{"type":421,"tag":455,"props":709,"children":710},{},[711],{"type":427,"value":712},"Seamless user experience",{"type":421,"tag":455,"props":714,"children":715},{},[716],{"type":427,"value":717},"Enterprise-specific customization options",{"type":421,"tag":430,"props":719,"children":721},{"className":720},[564],[722,728],{"type":421,"tag":434,"props":723,"children":725},{"id":724},"technical-specifications-compliance-️",[726],{"type":427,"value":727},"Technical Specifications & Compliance ♻️",{"type":421,"tag":671,"props":729,"children":731},{"name":730},"Platform Flexibility",[732,739,777,783],{"type":421,"tag":733,"props":734,"children":736},"h4",{"id":735},"technical",[737],{"type":427,"value":738},"Technical",{"type":421,"tag":451,"props":740,"children":741},{},[742,747,752,757,762,767,772],{"type":421,"tag":455,"props":743,"children":744},{},[745],{"type":427,"value":746},"Windows (with Docker Engine and WSL)",{"type":421,"tag":455,"props":748,"children":749},{},[750],{"type":427,"value":751},"Native Linux installation",{"type":421,"tag":455,"props":753,"children":754},{},[755],{"type":427,"value":756},"Container deployment (Docker standalone & Swarm)",{"type":421,"tag":455,"props":758,"children":759},{},[760],{"type":427,"value":761},"Cluster management capability",{"type":421,"tag":455,"props":763,"children":764},{},[765],{"type":427,"value":766},"Enterprise-ready architecture",{"type":421,"tag":455,"props":768,"children":769},{},[770],{"type":427,"value":771},"High-availability options",{"type":421,"tag":455,"props":773,"children":774},{},[775],{"type":427,"value":776},"Load balancing support",{"type":421,"tag":733,"props":778,"children":780},{"id":779},"compliance",[781],{"type":427,"value":782},"Compliance",{"type":421,"tag":451,"props":784,"children":785},{},[786,791,796,801,806,811,816],{"type":421,"tag":455,"props":787,"children":788},{},[789],{"type":427,"value":790},"Full compliance with Law No. 5651",{"type":421,"tag":455,"props":792,"children":793},{},[794],{"type":427,"value":795},"Verifiable log proof system",{"type":421,"tag":455,"props":797,"children":798},{},[799],{"type":427,"value":800},"Secure data retention",{"type":421,"tag":455,"props":802,"children":803},{},[804],{"type":427,"value":805},"Network traffic analysis",{"type":421,"tag":455,"props":807,"children":808},{},[809],{"type":427,"value":810},"Guest & Employee Wi-Fi authentication",{"type":421,"tag":455,"props":812,"children":813},{},[814],{"type":427,"value":815},"Identity management",{"type":421,"tag":455,"props":817,"children":818},{},[819],{"type":427,"value":820},"Access control",{"type":421,"tag":422,"props":822,"children":824},{"id":823},"why-choose-logger",[825],{"type":427,"value":826},"Why Choose Logger? 🚀",{"type":421,"tag":828,"props":829,"children":833},"u-alert",{"color":830,"icon":831,"title":832},"green","i-heroicons-check-circle","Transform your network monitoring and security infrastructure with Logger - the intelligent choice for enterprise network management.",[],{"type":421,"tag":447,"props":835,"children":837},{"type":836},"success",[],{"type":421,"tag":451,"props":839,"children":840},{},[841,846,851,856,861,866],{"type":421,"tag":455,"props":842,"children":843},{},[844],{"type":427,"value":845},"Platform Independence: Deploy anywhere - Windows, Linux, or Container infrastructure",{"type":421,"tag":455,"props":847,"children":848},{},[849],{"type":427,"value":850},"Comprehensive Integration: Works with all major UTM devices and network equipment",{"type":421,"tag":455,"props":852,"children":853},{},[854],{"type":427,"value":855},"Advanced Security: AI-powered threat detection and analysis",{"type":421,"tag":455,"props":857,"children":858},{},[859],{"type":427,"value":860},"Regulatory Compliance: Built-in compliance with relevant regulations",{"type":421,"tag":455,"props":862,"children":863},{},[864],{"type":427,"value":865},"Enterprise-Ready: Designed for large-scale deployments and complex networks",{"type":421,"tag":455,"props":867,"children":868},{},[869],{"type":427,"value":870},"Intelligent Analytics: AI-enhanced reporting and analysis capabilities",{"type":421,"tag":828,"props":872,"children":876},{"color":873,"icon":874,"title":875},"gray","i-heroicons-information-circle","For detailed information about implementation and capabilities, please refer to our comprehensive documentation.",[],{"type":421,"tag":441,"props":878,"children":879},{},[880],{"type":427,"value":881},"Below you can examine how the Logger software works through the flow diagram.",{"type":421,"tag":883,"props":884,"children":885},"prose-mermaid",{},[886],{"type":421,"tag":887,"props":888,"children":892},"pre",{"className":889,"code":890,"language":891,"meta":415,"style":415},"language-mermaid shiki shiki-themes material-theme-lighter material-theme material-theme-palenight","flowchart TB\n    subgraph Sources[Data Sources]\n        direction LR\n        FW[Firewall]\n        AG[Agent]\n        RT[(Router)]\n        SW[Switch]\n    end\n\n    subgraph Collector[Data Collector]\n        direction TB\n        INPUT[Input Handler]\n        VALID[Validator]\n        TRANS[Transformer]\n        BUFF[Buffer]\n    end\n\n    subgraph Processing[Veri İşleme]\n        direction TB\n        FILTER[Data Filter]\n        ENRICH[Data Enrichment]\n        AGG[Aggregator]\n    end\n\n    subgraph Storage[Veri Depolama]\n        direction LR\n        CACHE[(Cache)]\n        DWH[(Data Warehouse)]\n        LAKE[(Data Lake)]\n    end\n\n    %% Bağlantılar\n    Sources --> |514/UDP| Collector\n    FW --> INPUT\n    AG --> INPUT\n    RT --> INPUT\n    SW --> INPUT\n    \n    INPUT --> VALID\n    VALID --> TRANS\n    TRANS --> BUFF\n    \n    BUFF --> FILTER\n    FILTER --> ENRICH\n    ENRICH --> AGG\n    \n    AGG --> CACHE\n    AGG --> DWH\n    AGG --> LAKE\n\n    class FW,AG,RT,SW source\n    class INPUT,VALID,TRANS,BUFF collector\n    class FILTER,ENRICH,AGG process\n    class CACHE,DWH,LAKE storage\n","mermaid",[893],{"type":421,"tag":894,"props":895,"children":896},"code",{"__ignoreMap":415},[897,908,917,926,935,944,953,962,971,981,990,999,1008,1017,1026,1035,1043,1051,1060,1068,1077,1086,1095,1103,1111,1120,1128,1137,1146,1155,1163,1171,1180,1189,1198,1207,1216,1225,1234,1243,1252,1261,1269,1278,1287,1296,1304,1313,1322,1331,1339,1348,1357,1366],{"type":421,"tag":898,"props":899,"children":902},"span",{"class":900,"line":901},"line",1,[903],{"type":421,"tag":898,"props":904,"children":905},{},[906],{"type":427,"value":907},"flowchart TB\n",{"type":421,"tag":898,"props":909,"children":911},{"class":900,"line":910},2,[912],{"type":421,"tag":898,"props":913,"children":914},{},[915],{"type":427,"value":916},"    subgraph Sources[Data Sources]\n",{"type":421,"tag":898,"props":918,"children":920},{"class":900,"line":919},3,[921],{"type":421,"tag":898,"props":922,"children":923},{},[924],{"type":427,"value":925},"        direction LR\n",{"type":421,"tag":898,"props":927,"children":929},{"class":900,"line":928},4,[930],{"type":421,"tag":898,"props":931,"children":932},{},[933],{"type":427,"value":934},"        FW[Firewall]\n",{"type":421,"tag":898,"props":936,"children":938},{"class":900,"line":937},5,[939],{"type":421,"tag":898,"props":940,"children":941},{},[942],{"type":427,"value":943},"        AG[Agent]\n",{"type":421,"tag":898,"props":945,"children":947},{"class":900,"line":946},6,[948],{"type":421,"tag":898,"props":949,"children":950},{},[951],{"type":427,"value":952},"        RT[(Router)]\n",{"type":421,"tag":898,"props":954,"children":956},{"class":900,"line":955},7,[957],{"type":421,"tag":898,"props":958,"children":959},{},[960],{"type":427,"value":961},"        SW[Switch]\n",{"type":421,"tag":898,"props":963,"children":965},{"class":900,"line":964},8,[966],{"type":421,"tag":898,"props":967,"children":968},{},[969],{"type":427,"value":970},"    end\n",{"type":421,"tag":898,"props":972,"children":974},{"class":900,"line":973},9,[975],{"type":421,"tag":898,"props":976,"children":978},{"emptyLinePlaceholder":977},true,[979],{"type":427,"value":980},"\n",{"type":421,"tag":898,"props":982,"children":984},{"class":900,"line":983},10,[985],{"type":421,"tag":898,"props":986,"children":987},{},[988],{"type":427,"value":989},"    subgraph Collector[Data Collector]\n",{"type":421,"tag":898,"props":991,"children":993},{"class":900,"line":992},11,[994],{"type":421,"tag":898,"props":995,"children":996},{},[997],{"type":427,"value":998},"        direction TB\n",{"type":421,"tag":898,"props":1000,"children":1002},{"class":900,"line":1001},12,[1003],{"type":421,"tag":898,"props":1004,"children":1005},{},[1006],{"type":427,"value":1007},"        INPUT[Input Handler]\n",{"type":421,"tag":898,"props":1009,"children":1011},{"class":900,"line":1010},13,[1012],{"type":421,"tag":898,"props":1013,"children":1014},{},[1015],{"type":427,"value":1016},"        VALID[Validator]\n",{"type":421,"tag":898,"props":1018,"children":1020},{"class":900,"line":1019},14,[1021],{"type":421,"tag":898,"props":1022,"children":1023},{},[1024],{"type":427,"value":1025},"        TRANS[Transformer]\n",{"type":421,"tag":898,"props":1027,"children":1029},{"class":900,"line":1028},15,[1030],{"type":421,"tag":898,"props":1031,"children":1032},{},[1033],{"type":427,"value":1034},"        BUFF[Buffer]\n",{"type":421,"tag":898,"props":1036,"children":1038},{"class":900,"line":1037},16,[1039],{"type":421,"tag":898,"props":1040,"children":1041},{},[1042],{"type":427,"value":970},{"type":421,"tag":898,"props":1044,"children":1046},{"class":900,"line":1045},17,[1047],{"type":421,"tag":898,"props":1048,"children":1049},{"emptyLinePlaceholder":977},[1050],{"type":427,"value":980},{"type":421,"tag":898,"props":1052,"children":1054},{"class":900,"line":1053},18,[1055],{"type":421,"tag":898,"props":1056,"children":1057},{},[1058],{"type":427,"value":1059},"    subgraph Processing[Veri İşleme]\n",{"type":421,"tag":898,"props":1061,"children":1063},{"class":900,"line":1062},19,[1064],{"type":421,"tag":898,"props":1065,"children":1066},{},[1067],{"type":427,"value":998},{"type":421,"tag":898,"props":1069,"children":1071},{"class":900,"line":1070},20,[1072],{"type":421,"tag":898,"props":1073,"children":1074},{},[1075],{"type":427,"value":1076},"        FILTER[Data Filter]\n",{"type":421,"tag":898,"props":1078,"children":1080},{"class":900,"line":1079},21,[1081],{"type":421,"tag":898,"props":1082,"children":1083},{},[1084],{"type":427,"value":1085},"        ENRICH[Data Enrichment]\n",{"type":421,"tag":898,"props":1087,"children":1089},{"class":900,"line":1088},22,[1090],{"type":421,"tag":898,"props":1091,"children":1092},{},[1093],{"type":427,"value":1094},"        AGG[Aggregator]\n",{"type":421,"tag":898,"props":1096,"children":1098},{"class":900,"line":1097},23,[1099],{"type":421,"tag":898,"props":1100,"children":1101},{},[1102],{"type":427,"value":970},{"type":421,"tag":898,"props":1104,"children":1106},{"class":900,"line":1105},24,[1107],{"type":421,"tag":898,"props":1108,"children":1109},{"emptyLinePlaceholder":977},[1110],{"type":427,"value":980},{"type":421,"tag":898,"props":1112,"children":1114},{"class":900,"line":1113},25,[1115],{"type":421,"tag":898,"props":1116,"children":1117},{},[1118],{"type":427,"value":1119},"    subgraph Storage[Veri Depolama]\n",{"type":421,"tag":898,"props":1121,"children":1123},{"class":900,"line":1122},26,[1124],{"type":421,"tag":898,"props":1125,"children":1126},{},[1127],{"type":427,"value":925},{"type":421,"tag":898,"props":1129,"children":1131},{"class":900,"line":1130},27,[1132],{"type":421,"tag":898,"props":1133,"children":1134},{},[1135],{"type":427,"value":1136},"        CACHE[(Cache)]\n",{"type":421,"tag":898,"props":1138,"children":1140},{"class":900,"line":1139},28,[1141],{"type":421,"tag":898,"props":1142,"children":1143},{},[1144],{"type":427,"value":1145},"        DWH[(Data Warehouse)]\n",{"type":421,"tag":898,"props":1147,"children":1149},{"class":900,"line":1148},29,[1150],{"type":421,"tag":898,"props":1151,"children":1152},{},[1153],{"type":427,"value":1154},"        LAKE[(Data Lake)]\n",{"type":421,"tag":898,"props":1156,"children":1158},{"class":900,"line":1157},30,[1159],{"type":421,"tag":898,"props":1160,"children":1161},{},[1162],{"type":427,"value":970},{"type":421,"tag":898,"props":1164,"children":1166},{"class":900,"line":1165},31,[1167],{"type":421,"tag":898,"props":1168,"children":1169},{"emptyLinePlaceholder":977},[1170],{"type":427,"value":980},{"type":421,"tag":898,"props":1172,"children":1174},{"class":900,"line":1173},32,[1175],{"type":421,"tag":898,"props":1176,"children":1177},{},[1178],{"type":427,"value":1179},"    %% Bağlantılar\n",{"type":421,"tag":898,"props":1181,"children":1183},{"class":900,"line":1182},33,[1184],{"type":421,"tag":898,"props":1185,"children":1186},{},[1187],{"type":427,"value":1188},"    Sources --> |514/UDP| Collector\n",{"type":421,"tag":898,"props":1190,"children":1192},{"class":900,"line":1191},34,[1193],{"type":421,"tag":898,"props":1194,"children":1195},{},[1196],{"type":427,"value":1197},"    FW --> INPUT\n",{"type":421,"tag":898,"props":1199,"children":1201},{"class":900,"line":1200},35,[1202],{"type":421,"tag":898,"props":1203,"children":1204},{},[1205],{"type":427,"value":1206},"    AG --> INPUT\n",{"type":421,"tag":898,"props":1208,"children":1210},{"class":900,"line":1209},36,[1211],{"type":421,"tag":898,"props":1212,"children":1213},{},[1214],{"type":427,"value":1215},"    RT --> INPUT\n",{"type":421,"tag":898,"props":1217,"children":1219},{"class":900,"line":1218},37,[1220],{"type":421,"tag":898,"props":1221,"children":1222},{},[1223],{"type":427,"value":1224},"    SW --> INPUT\n",{"type":421,"tag":898,"props":1226,"children":1228},{"class":900,"line":1227},38,[1229],{"type":421,"tag":898,"props":1230,"children":1231},{},[1232],{"type":427,"value":1233},"    \n",{"type":421,"tag":898,"props":1235,"children":1237},{"class":900,"line":1236},39,[1238],{"type":421,"tag":898,"props":1239,"children":1240},{},[1241],{"type":427,"value":1242},"    INPUT --> VALID\n",{"type":421,"tag":898,"props":1244,"children":1246},{"class":900,"line":1245},40,[1247],{"type":421,"tag":898,"props":1248,"children":1249},{},[1250],{"type":427,"value":1251},"    VALID --> TRANS\n",{"type":421,"tag":898,"props":1253,"children":1255},{"class":900,"line":1254},41,[1256],{"type":421,"tag":898,"props":1257,"children":1258},{},[1259],{"type":427,"value":1260},"    TRANS --> BUFF\n",{"type":421,"tag":898,"props":1262,"children":1264},{"class":900,"line":1263},42,[1265],{"type":421,"tag":898,"props":1266,"children":1267},{},[1268],{"type":427,"value":1233},{"type":421,"tag":898,"props":1270,"children":1272},{"class":900,"line":1271},43,[1273],{"type":421,"tag":898,"props":1274,"children":1275},{},[1276],{"type":427,"value":1277},"    BUFF --> FILTER\n",{"type":421,"tag":898,"props":1279,"children":1281},{"class":900,"line":1280},44,[1282],{"type":421,"tag":898,"props":1283,"children":1284},{},[1285],{"type":427,"value":1286},"    FILTER --> ENRICH\n",{"type":421,"tag":898,"props":1288,"children":1290},{"class":900,"line":1289},45,[1291],{"type":421,"tag":898,"props":1292,"children":1293},{},[1294],{"type":427,"value":1295},"    ENRICH --> AGG\n",{"type":421,"tag":898,"props":1297,"children":1299},{"class":900,"line":1298},46,[1300],{"type":421,"tag":898,"props":1301,"children":1302},{},[1303],{"type":427,"value":1233},{"type":421,"tag":898,"props":1305,"children":1307},{"class":900,"line":1306},47,[1308],{"type":421,"tag":898,"props":1309,"children":1310},{},[1311],{"type":427,"value":1312},"    AGG --> CACHE\n",{"type":421,"tag":898,"props":1314,"children":1316},{"class":900,"line":1315},48,[1317],{"type":421,"tag":898,"props":1318,"children":1319},{},[1320],{"type":427,"value":1321},"    AGG --> DWH\n",{"type":421,"tag":898,"props":1323,"children":1325},{"class":900,"line":1324},49,[1326],{"type":421,"tag":898,"props":1327,"children":1328},{},[1329],{"type":427,"value":1330},"    AGG --> LAKE\n",{"type":421,"tag":898,"props":1332,"children":1334},{"class":900,"line":1333},50,[1335],{"type":421,"tag":898,"props":1336,"children":1337},{"emptyLinePlaceholder":977},[1338],{"type":427,"value":980},{"type":421,"tag":898,"props":1340,"children":1342},{"class":900,"line":1341},51,[1343],{"type":421,"tag":898,"props":1344,"children":1345},{},[1346],{"type":427,"value":1347},"    class FW,AG,RT,SW source\n",{"type":421,"tag":898,"props":1349,"children":1351},{"class":900,"line":1350},52,[1352],{"type":421,"tag":898,"props":1353,"children":1354},{},[1355],{"type":427,"value":1356},"    class INPUT,VALID,TRANS,BUFF collector\n",{"type":421,"tag":898,"props":1358,"children":1360},{"class":900,"line":1359},53,[1361],{"type":421,"tag":898,"props":1362,"children":1363},{},[1364],{"type":427,"value":1365},"    class FILTER,ENRICH,AGG process\n",{"type":421,"tag":898,"props":1367,"children":1369},{"class":900,"line":1368},54,[1370],{"type":421,"tag":898,"props":1371,"children":1372},{},[1373],{"type":427,"value":1374},"    class CACHE,DWH,LAKE storage\n",{"type":421,"tag":1376,"props":1377,"children":1378},"style",{},[1379],{"type":427,"value":1380},"html .light .shiki span {color: var(--shiki-light);background: var(--shiki-light-bg);font-style: var(--shiki-light-font-style);font-weight: var(--shiki-light-font-weight);text-decoration: var(--shiki-light-text-decoration);}html.light .shiki span {color: var(--shiki-light);background: var(--shiki-light-bg);font-style: var(--shiki-light-font-style);font-weight: var(--shiki-light-font-weight);text-decoration: var(--shiki-light-text-decoration);}html .default .shiki span {color: var(--shiki-default);background: var(--shiki-default-bg);font-style: var(--shiki-default-font-style);font-weight: var(--shiki-default-font-weight);text-decoration: var(--shiki-default-text-decoration);}html .shiki span {color: var(--shiki-default);background: var(--shiki-default-bg);font-style: var(--shiki-default-font-style);font-weight: var(--shiki-default-font-weight);text-decoration: var(--shiki-default-text-decoration);}html .dark .shiki span {color: var(--shiki-dark);background: var(--shiki-dark-bg);font-style: var(--shiki-dark-font-style);font-weight: var(--shiki-dark-font-weight);text-decoration: var(--shiki-dark-text-decoration);}html.dark .shiki span {color: var(--shiki-dark);background: var(--shiki-dark-bg);font-style: var(--shiki-dark-font-style);font-weight: var(--shiki-dark-font-weight);text-decoration: var(--shiki-dark-text-decoration);}",{"title":415,"searchDepth":910,"depth":910,"links":1382},[1383,1389],{"id":424,"depth":910,"text":428,"children":1384},[1385,1386,1387,1388],{"id":436,"depth":919,"text":439},{"id":568,"depth":919,"text":571},{"id":661,"depth":919,"text":664},{"id":724,"depth":919,"text":727},{"id":823,"depth":910,"text":826},"markdown","content:en:1.getting-started:1.index.md","content","en/1.getting-started/1.index.md","en/1.getting-started/1.index","md",[1397,1398],null,{"_path":16,"_dir":1399,"_draft":414,"_partial":414,"_locale":415,"title":15,"description":1400,"body":1401,"_type":1390,"_id":1904,"_source":1392,"_file":1905,"_stem":1906,"_extension":1395},"getting-started","This page will help you install Logger on your machine at the fastest and most basic level.",{"type":418,"children":1402,"toc":1897},[1403,1413,1419,1449,1455,1467,1471,1477,1482,1506,1511,1515,1519,1535,1539,1893],{"type":421,"tag":1404,"props":1405,"children":1407},"callout",{"icon":1406},"i-heroicons-exclamation-triangle",[1408],{"type":421,"tag":441,"props":1409,"children":1410},{},[1411],{"type":427,"value":1412},"Logger offers a free trial for 30 days from the first installation.",{"type":421,"tag":422,"props":1414,"children":1416},{"id":1415},"prerequisites",[1417],{"type":427,"value":1418},"Prerequisites 👇🏻",{"type":421,"tag":451,"props":1420,"children":1421},{},[1422,1431,1440],{"type":421,"tag":455,"props":1423,"children":1424},{},[1425],{"type":421,"tag":894,"props":1426,"children":1428},{"className":1427},[],[1429],{"type":427,"value":1430},"If you are using a Linux-based operating system, you must have Docker Engine installed. If you are using Windows or MacOS, you must have Docker Desktop installed.",{"type":421,"tag":455,"props":1432,"children":1433},{},[1434],{"type":421,"tag":894,"props":1435,"children":1437},{"className":1436},[],[1438],{"type":427,"value":1439},"A minimum of 12GB of memory must be allocated to Docker.",{"type":421,"tag":455,"props":1441,"children":1442},{},[1443],{"type":421,"tag":894,"props":1444,"children":1446},{"className":1445},[],[1447],{"type":427,"value":1448},"A minimum of 12 Core of CPU must be allocated to Docker.",{"type":421,"tag":422,"props":1450,"children":1452},{"id":1451},"getstart-the-logger-docker-container",[1453],{"type":427,"value":1454},"Get&Start The Logger Docker Container 🏃",{"type":421,"tag":441,"props":1456,"children":1457},{},[1458,1460,1465],{"type":427,"value":1459},"This document aims to install and configure the Logger software in a basic way. This process is done through a docker container. When you run the following command, a container named ",{"type":421,"tag":459,"props":1461,"children":1462},{},[1463],{"type":427,"value":1464},"Logger-Setup",{"type":427,"value":1466}," will stand up and perform all the setup operations at the most basic level. It will then self-destruct.",{"type":421,"tag":1468,"props":1469,"children":1470},"install-command-block",{},[],{"type":421,"tag":434,"props":1472,"children":1474},{"id":1473},"verify",[1475],{"type":427,"value":1476},"Verify ✅",{"type":421,"tag":441,"props":1478,"children":1479},{},[1480],{"type":427,"value":1481},"Verify the Installation. Ensure that your containers are running correctly. To view the status of your containers, run the following command:",{"type":421,"tag":887,"props":1483,"children":1487},{"className":1484,"code":1485,"language":1486,"meta":415,"style":415},"language-bash shiki shiki-themes material-theme-lighter material-theme material-theme-palenight"," docker ps\n","bash",[1488],{"type":421,"tag":894,"props":1489,"children":1490},{"__ignoreMap":415},[1491],{"type":421,"tag":898,"props":1492,"children":1493},{"class":900,"line":901},[1494,1500],{"type":421,"tag":898,"props":1495,"children":1497},{"style":1496},"--shiki-light:#E2931D;--shiki-default:#FFCB6B;--shiki-dark:#FFCB6B",[1498],{"type":427,"value":1499}," docker",{"type":421,"tag":898,"props":1501,"children":1503},{"style":1502},"--shiki-light:#91B859;--shiki-default:#C3E88D;--shiki-dark:#C3E88D",[1504],{"type":427,"value":1505}," ps\n",{"type":421,"tag":441,"props":1507,"children":1508},{},[1509],{"type":427,"value":1510},"The output should look similar to the following:",{"type":421,"tag":1512,"props":1513,"children":1514},"docker-ps-table",{},[],{"type":421,"tag":828,"props":1516,"children":1518},{"color":830,"icon":831,"title":1517},"That's it! You have successfully completed the Logger installation.",[],{"type":421,"tag":441,"props":1520,"children":1521},{},[1522,1524,1533],{"type":427,"value":1523},"You can start using it now. Wait for all the pods to be in running state, and then point your browser to ",{"type":421,"tag":1525,"props":1526,"children":1530},"a",{"href":1527,"rel":1528},"https://localhost:443",[1529],"nofollow",[1531],{"type":427,"value":1532},"https://ip_address:443",{"type":427,"value":1534}," to access the dashboard, replacing with the IP address of the machine where you installed product. 🏡",{"type":421,"tag":1536,"props":1537,"children":1538},"hr",{},[],{"type":421,"tag":430,"props":1540,"children":1544},{"className":1541},[1542,1543],"mt-4:bg-gray-100","dark:bg-gray-800",[1545,1551],{"type":421,"tag":422,"props":1546,"children":1548},{"id":1547},"send-log-data-️",[1549],{"type":427,"value":1550},"Send Log Data ↗️",{"type":421,"tag":671,"props":1552,"children":1553},{"name":730},[1554,1559,1611,1616,1622,1636,1642,1661,1689,1695,1717,1723,1734,1760,1766,1788,1792,1797,1815,1820,1838,1844,1861,1888],{"type":421,"tag":441,"props":1555,"children":1556},{},[1557],{"type":427,"value":1558},"Go to the log sending settings of your security device and enter the Ip address of the Logger. You can send logs to the Logger software via many protocols.",{"type":421,"tag":1404,"props":1560,"children":1561},{"icon":1406},[1562],{"type":421,"tag":441,"props":1563,"children":1564},{},[1565,1567,1571,1573,1576,1578,1584,1586,1589,1591,1596,1597,1600,1602,1607,1608],{"type":427,"value":1566},"The log sending process may differ depending on the security device. You can find how to send logs from some security devices on our blog page. If it is not available on our blog page, you can go to the official website of the device brand and browse the support documents.",{"type":421,"tag":1568,"props":1569,"children":1570},"br",{},[],{"type":427,"value":1572},"\nIn the section below, you can access the blog posts of log submission processes of some brands;",{"type":421,"tag":1568,"props":1574,"children":1575},{},[],{"type":427,"value":1577},"\nFortigate: ",{"type":421,"tag":1525,"props":1579,"children":1581},{"href":202,"target":1580},"Blank",[1582],{"type":427,"value":1583},"blog/how-to-config-fortigate...",{"type":427,"value":1585}," ",{"type":421,"tag":1568,"props":1587,"children":1588},{},[],{"type":427,"value":1590},"\nSophos: ",{"type":421,"tag":1525,"props":1592,"children":1593},{"href":208,"target":1580},[1594],{"type":427,"value":1595},"blog/how-to-config-sophos...",{"type":427,"value":1585},{"type":421,"tag":1568,"props":1598,"children":1599},{},[],{"type":427,"value":1601},"\nPalo Alto: ",{"type":421,"tag":1525,"props":1603,"children":1604},{"href":205,"target":1580},[1605],{"type":427,"value":1606},"blog/how-to-config-paloalto...",{"type":427,"value":1585},{"type":421,"tag":1568,"props":1609,"children":1610},{},[],{"type":421,"tag":1612,"props":1613,"children":1615},"doc-navigation",{":items":1614},"[{\"date\":\"1\",\"title\":\"Add Data Source\",\"description\":\"Forward log to Logger\",\"icon\":\"i-heroicons-plus-circle\",\"completed\":true},{\"date\":\"2\",\"title\":\"Verify Live Data Flow\",\"description\":\"Make sure you get a log from your device\",\"icon\":\"i-heroicons-check-badge\",\"completed\":true},{\"date\":\"3\",\"title\":\"Backup/Forensic Sign Service\",\"description\":\"Enable log backup service\",\"icon\":\"i-heroicons-server-stack\",\"completed\":true}]",[],{"type":421,"tag":422,"props":1617,"children":1619},{"id":1618},"add-data-source",[1620],{"type":427,"value":1621},"Add Data Source ➕",{"type":421,"tag":441,"props":1623,"children":1624},{},[1625,1627,1634],{"type":427,"value":1626},"After the installation is complete, log in to the Web UI. Then open the ",{"type":421,"tag":1628,"props":1629,"children":1632},"u-badge",{"color":1630,"variant":1631},"primary","soft",[1633],{"type":427,"value":36},{"type":427,"value":1635}," page and follow the steps below.",{"type":421,"tag":434,"props":1637,"children":1639},{"id":1638},"steps-to-add-data-source",[1640],{"type":427,"value":1641},"Steps to Add Data Source ⛁",{"type":421,"tag":441,"props":1643,"children":1644},{},[1645,1647,1652,1654,1659],{"type":427,"value":1646},"Go to ",{"type":421,"tag":1628,"props":1648,"children":1649},{"color":1630,"variant":1631},[1650],{"type":427,"value":1651},"Management > Source",{"type":427,"value":1653}," and then click ",{"type":421,"tag":1628,"props":1655,"children":1656},{"color":1630,"variant":1631},[1657],{"type":427,"value":1658},"Create New",{"type":427,"value":1660}," button.",{"type":421,"tag":451,"props":1662,"children":1663},{},[1664,1674],{"type":421,"tag":455,"props":1665,"children":1666},{},[1667,1672],{"type":421,"tag":459,"props":1668,"children":1669},{},[1670],{"type":427,"value":1671},"Vendor:",{"type":427,"value":1673}," Select the device brand",{"type":421,"tag":455,"props":1675,"children":1676},{},[1677,1682,1684],{"type":421,"tag":459,"props":1678,"children":1679},{},[1680],{"type":427,"value":1681},"Data Source:",{"type":427,"value":1683}," Select your device and then click ",{"type":421,"tag":1628,"props":1685,"children":1686},{"color":1630,"variant":1631},[1687],{"type":427,"value":1688},"Add Button",{"type":421,"tag":733,"props":1690,"children":1692},{"id":1691},"license-activationoptional",[1693],{"type":427,"value":1694},"License Activation(Optional) ✅",{"type":421,"tag":451,"props":1696,"children":1697},{},[1698],{"type":421,"tag":455,"props":1699,"children":1700},{},[1701,1703,1708,1710,1715],{"type":427,"value":1702},"After adding the data source, a 30-day demo license is automatically defined. If you have the license key, you can click the ",{"type":421,"tag":1628,"props":1704,"children":1705},{"color":1630,"variant":1631},[1706],{"type":427,"value":1707},"Activation",{"type":427,"value":1709}," button in the ",{"type":421,"tag":1628,"props":1711,"children":1712},{"color":1630,"variant":1631},[1713],{"type":427,"value":1714},"Action",{"type":427,"value":1716}," section and enter your license key.",{"type":421,"tag":422,"props":1718,"children":1720},{"id":1719},"viewing-live-data",[1721],{"type":427,"value":1722},"Viewing Live Data 🧐",{"type":421,"tag":441,"props":1724,"children":1725},{},[1726,1727,1732],{"type":427,"value":1646},{"type":421,"tag":1628,"props":1728,"children":1729},{"color":1630,"variant":1631},[1730],{"type":427,"value":1731},"Data View > Default View",{"type":427,"value":1733}," page.",{"type":421,"tag":451,"props":1735,"children":1736},{},[1737,1755],{"type":421,"tag":455,"props":1738,"children":1739},{},[1740,1742,1747,1749,1753],{"type":427,"value":1741},"Click on ",{"type":421,"tag":1628,"props":1743,"children":1744},{"color":1630,"variant":1631},[1745],{"type":427,"value":1746}," Data View ",{"type":427,"value":1748}," Sources under the ",{"type":421,"tag":1628,"props":1750,"children":1751},{"color":1630,"variant":1631},[1752],{"type":427,"value":40},{"type":427,"value":1754}," Filters menu and select your registered source.",{"type":421,"tag":455,"props":1756,"children":1757},{},[1758],{"type":427,"value":1759},"If you can see the live log stream after this process, the process has been completed successfully.",{"type":421,"tag":422,"props":1761,"children":1763},{"id":1762},"backup-forensic-sign-️",[1764],{"type":427,"value":1765},"Backup & Forensic Sign 🗳️",{"type":421,"tag":441,"props":1767,"children":1768},{},[1769,1771,1774,1776,1779,1781,1786],{"type":427,"value":1770},"Once the data source is added, the backup and signing service will start automatically. ",{"type":421,"tag":1568,"props":1772,"children":1773},{},[],{"type":427,"value":1775},"\nThe backup service uses Logger's local S3 system by default. ",{"type":421,"tag":1568,"props":1777,"children":1778},{},[],{"type":427,"value":1780},"\nCheck the ",{"type":421,"tag":1628,"props":1782,"children":1783},{"color":1630,"variant":1631},[1784],{"type":427,"value":1785}," Management > Data Management > Backup/Forensic Sign ",{"type":427,"value":1787}," page to review.",{"type":421,"tag":828,"props":1789,"children":1791},{"color":830,"icon":831,"title":1790},"Setup Complete!",[],{"type":421,"tag":441,"props":1793,"children":1794},{},[1795],{"type":427,"value":1796},"Your system is now:",{"type":421,"tag":451,"props":1798,"children":1799},{},[1800,1805,1810],{"type":421,"tag":455,"props":1801,"children":1802},{},[1803],{"type":427,"value":1804},"Receiving real-time logs from your data source,",{"type":421,"tag":455,"props":1806,"children":1807},{},[1808],{"type":427,"value":1809},"Creating daily backups,",{"type":421,"tag":455,"props":1811,"children":1812},{},[1813],{"type":427,"value":1814},"Signing logs at the end of each day for forensic purposes",{"type":421,"tag":828,"props":1816,"children":1819},{"color":1817,"icon":874,"title":1818},"blue","Daily Operations:",[],{"type":421,"tag":451,"props":1821,"children":1822},{},[1823,1828,1833],{"type":421,"tag":455,"props":1824,"children":1825},{},[1826],{"type":427,"value":1827},"Logs are automatically backed up,",{"type":421,"tag":455,"props":1829,"children":1830},{},[1831],{"type":427,"value":1832},"Digital signatures are created for forensic verification,",{"type":421,"tag":455,"props":1834,"children":1835},{},[1836],{"type":427,"value":1837},"No additional daily maintenance required",{"type":421,"tag":422,"props":1839,"children":1841},{"id":1840},"add-storage-adapteroptional-️",[1842],{"type":427,"value":1843},"Add Storage Adapter(Optional) 🗄️",{"type":421,"tag":441,"props":1845,"children":1846},{},[1847,1849,1854,1856],{"type":427,"value":1848},"The backup service uses the local S3 system of the Logger software by default. If you wish, you can move the logs from the local system to your own external storage system. For this you need to add ",{"type":421,"tag":1628,"props":1850,"children":1851},{"color":1630,"variant":1631},[1852],{"type":427,"value":1853}," Storage Adapter",{"type":427,"value":1855}," To add a storage adapter, go to ",{"type":421,"tag":1628,"props":1857,"children":1858},{"color":1630,"variant":1631},[1859],{"type":427,"value":1860}," Management > Objects > Storage Adapter",{"type":421,"tag":451,"props":1862,"children":1863},{},[1864,1873,1883],{"type":421,"tag":455,"props":1865,"children":1866},{},[1867,1869],{"type":427,"value":1868},"And then click ",{"type":421,"tag":1628,"props":1870,"children":1871},{"color":1630,"variant":1631},[1872],{"type":427,"value":1658},{"type":421,"tag":455,"props":1874,"children":1875},{},[1876,1878],{"type":427,"value":1877},"Select Storage from  ",{"type":421,"tag":1628,"props":1879,"children":1880},{"color":1630,"variant":1631},[1881],{"type":427,"value":1882},"Storage Adapter list ",{"type":421,"tag":455,"props":1884,"children":1885},{},[1886],{"type":427,"value":1887},"Then enter the information requested from you.",{"type":421,"tag":441,"props":1889,"children":1890},{},[1891],{"type":427,"value":1892},"After this process, the transfer will start automatically.",{"type":421,"tag":1376,"props":1894,"children":1895},{},[1896],{"type":427,"value":1380},{"title":415,"searchDepth":910,"depth":910,"links":1898},[1899,1900,1903],{"id":1415,"depth":910,"text":1418},{"id":1451,"depth":910,"text":1454,"children":1901},[1902],{"id":1473,"depth":919,"text":1476},{"id":1547,"depth":910,"text":1550},"content:en:1.getting-started:2.quickstart.md","en/1.getting-started/2.quickstart.md","en/1.getting-started/2.quickstart",1775654248225]