[{"data":1,"prerenderedAt":1249},["ShallowReactive",2],{"navigation":3,"/en/integrations/time-stamp-server":411,"/en/integrations/time-stamp-server-surround":576},[4,218],{"title":5,"_path":6,"children":7},"En","/en",[8,29,35,67,77,87,105,130,148,155,162,178,190],{"title":9,"_path":10,"children":11},"Getting Started","/en/getting-started",[12,14,17,20,23,26],{"title":13,"_path":10},"Introduction",{"title":15,"_path":16},"Quick Start","/en/getting-started/quickstart",{"title":18,"_path":19},"Installation on Docker Standalone","/en/getting-started/dockerstandalone",{"title":21,"_path":22},"Installation on Docker Swarm","/en/getting-started/dockerswarm",{"title":24,"_path":25},"Installation on Windows","/en/getting-started/windows",{"title":27,"_path":28},"Installation on Linux","/en/getting-started/linux",{"title":30,"_path":31,"children":32},"Dashboard","/en/dashboard",[33],{"title":30,"_path":34},"/en/dashboard/dashboard",{"title":36,"_path":37,"children":38},"Datacollector","/en/datacollector",[39,42,45],{"title":40,"_path":41},"Data View","/en/datacollector/view",{"title":43,"_path":44},"Management","/en/datacollector/management",{"title":46,"_path":47,"children":48},"Vendors","/en/datacollector/vendors",[49,52,55,58,61,64],{"title":50,"_path":51},"Default Syslog Configuration","/en/datacollector/vendors/default",{"title":53,"_path":54},"FortiGate Syslog Configuration","/en/datacollector/vendors/fortigate-syslog",{"title":56,"_path":57},"Palo Alto Syslog Configuration","/en/datacollector/vendors/palo-alto-syslog",{"title":59,"_path":60},"Ruijie Syslog Configuration","/en/datacollector/vendors/ruijie-syslog",{"title":62,"_path":63},"Sophos Syslog Configuration","/en/datacollector/vendors/sophos-syslog",{"title":65,"_path":66},"SonicWall Syslog Configuration","/en/datacollector/vendors/sonicwall-syslog",{"title":68,"_path":69,"children":70},"Reports","/en/reports",[71,74],{"title":72,"_path":73},"Reports Views","/en/reports/view",{"title":75,"_path":76},"Scheduled Reports","/en/reports/scheduled-reports",{"title":78,"_path":79,"children":80},"Alert","/en/alert",[81,84],{"title":82,"_path":83},"Rule Management","/en/alert/rule-management",{"title":85,"_path":86},"Notification Policy","/en/alert/notification-policy",{"title":88,"_path":89,"children":90},"Hotspot","/en/hotspot",[91,93,96,99,102],{"title":13,"_path":92},"/en/hotspot/introduction",{"title":94,"_path":95},"Location","/en/hotspot/locations",{"title":97,"_path":98},"Templates","/en/hotspot/templates",{"title":100,"_path":101},"User Activity","/en/hotspot/user-stats",{"title":103,"_path":104},"Black & White List","/en/hotspot/bw-list",{"title":106,"_path":107,"children":108},"Integrations","/en/integrations",[109,112,115,118,121,124,127],{"title":110,"_path":111},"SMTP Server","/en/integrations/smtp",{"title":113,"_path":114},"SMS Provider","/en/integrations/sms",{"title":116,"_path":117},"PMS Integration","/en/integrations/pms",{"title":119,"_path":120},"LDAP Integration","/en/integrations/ldap",{"title":122,"_path":123},"API Integration","/en/integrations/api",{"title":125,"_path":126},"NTP Server Integration","/en/integrations/ntp",{"title":128,"_path":129},"Timestamp Server Integration","/en/integrations/time-stamp-server",{"title":43,"_path":131,"children":132},"/en/management",[133,136,139,142,145],{"title":134,"_path":135},"Data Management","/en/management/data-management",{"title":137,"_path":138},"Contact Management","/en/management/contact-management",{"title":140,"_path":141},"Object Management","/en/management/object",{"title":143,"_path":144},"Command Line Interface","/en/management/command-line-interface",{"title":146,"_path":147},"Disk Capacity Planning Formula","/en/management/disk-management",{"title":149,"_path":150,"children":151},"License","/en/license",[152],{"title":153,"_path":154},"License & Agents","/en/license/license",{"title":156,"_path":157,"children":158},"User Authentication","/en/user-authentication",[159],{"title":160,"_path":161},"User & Authentication ","/en/user-authentication/user-authentication",{"title":163,"_path":164,"children":165},"System","/en/system",[166,169,172,175],{"title":167,"_path":168},"Administrator Management","/en/system/administrator",{"title":170,"_path":171},"Feature Visibility","/en/system/features-visibility",{"title":173,"_path":174},"Update","/en/system/update",{"title":176,"_path":177},"System Settings","/en/system/settings",{"title":179,"_path":180,"children":181},"Practice","/en/practice",[182,185,187],{"title":183,"_path":184},"Top Bantwidth Usage","/en/practice/topbantwidthusage",{"title":183,"_path":186},"/en/practice/most-visited-websites",{"title":188,"_path":189},"Inspect Blocked Traffic","/en/practice/inspect-blocked-traffic",{"title":191,"_path":192,"children":193},"Blog","/en/blog",[194,197,200,203,206,209,212,215],{"title":195,"_path":196},"Load Balance Configuration with Docker Swarm","/en/blog/load-balance-config",{"title":198,"_path":199},"Getting Started with the AI Module","/en/blog/ai-module",{"title":201,"_path":202},"How To Config Fortigate Syslog","/en/blog/how-to-config-fortigate-syslog",{"title":204,"_path":205},"How To Config Paloalto Syslog","/en/blog/how-to-config-paloalto-syslog",{"title":207,"_path":208},"How To Config Sophos Syslog","/en/blog/how-to-config-sophos-syslog",{"title":210,"_path":211},"Installing MinIO on Linux Server","/en/blog/minio-install",{"title":213,"_path":214},"Docker Desktop On Windows","/en/blog/docker-desktop-on-windows",{"title":216,"_path":217},"Installing Docker on Ubuntu Server","/en/blog/docker-on-ubuntu-server",{"title":219,"_path":220,"children":221},"Tr","/tr",[222,242,247,275,284,293,310,333,350,356,361,375,387],{"title":223,"_path":224,"children":225},"Giriş","/tr/getting-started",[226,227,230,233,236,239],{"title":223,"_path":224},{"title":228,"_path":229},"Hızlı Başlangıç","/tr/getting-started/quickstart",{"title":231,"_path":232},"Docker Standalone Üzerine Kurulum","/tr/getting-started/dockerstandalone",{"title":234,"_path":235},"Docker Swarm Üzerinde Kurulum","/tr/getting-started/dockerswarm",{"title":237,"_path":238},"Windows'ta Kurulum","/tr/getting-started/windows",{"title":240,"_path":241},"Linux'ta Kurulum","/tr/getting-started/linux",{"title":30,"_path":243,"children":244},"/tr/dashboard",[245],{"title":30,"_path":246},"/tr/dashboard/dashboard",{"title":36,"_path":248,"children":249},"/tr/datacollector",[250,252,254],{"title":40,"_path":251},"/tr/datacollector/view",{"title":43,"_path":253},"/tr/datacollector/management",{"title":46,"_path":255,"children":256},"/tr/datacollector/vendors",[257,260,263,266,269,272],{"title":258,"_path":259},"Varsayılan Syslog Yapılandırması","/tr/datacollector/vendors/default",{"title":261,"_path":262},"FortiGate Syslog Yapılandırması","/tr/datacollector/vendors/fortigate-syslog",{"title":264,"_path":265},"Palo Alto Syslog Yapılandırması","/tr/datacollector/vendors/palo-alto-syslog",{"title":267,"_path":268},"Ruijie Syslog Yapılandırması","/tr/datacollector/vendors/ruijie-syslog",{"title":270,"_path":271},"Sophos Syslog Yapılandırması","/tr/datacollector/vendors/sophos-syslog",{"title":273,"_path":274},"SonicWall Syslog Yapılandırması","/tr/datacollector/vendors/sonicwall-syslog",{"title":68,"_path":276,"children":277},"/tr/reports",[278,281],{"title":279,"_path":280},"Rapor Görünümleri","/tr/reports/view",{"title":282,"_path":283},"Planlanmış Raporlar","/tr/reports/scheduled-reports",{"title":78,"_path":285,"children":286},"/tr/alert",[287,290],{"title":288,"_path":289},"Kural Yönetimi","/tr/alert/rule-management",{"title":291,"_path":292},"Bildirim Politikası","/tr/alert/notification-policy",{"title":88,"_path":294,"children":295},"/tr/hotspot",[296,298,301,304,307],{"title":223,"_path":297},"/tr/hotspot/introduction",{"title":299,"_path":300},"Konum","/tr/hotspot/locations",{"title":302,"_path":303},"Şablonlar","/tr/hotspot/templates",{"title":305,"_path":306},"Kullanıcı Etkinliği","/tr/hotspot/user-stats",{"title":308,"_path":309},"Kara ve Beyaz Liste","/tr/hotspot/bw-list",{"title":106,"_path":311,"children":312},"/tr/integrations",[313,315,318,321,324,327,330],{"title":110,"_path":314},"/tr/integrations/smtp",{"title":316,"_path":317},"SMS Sağlayıcı","/tr/integrations/sms",{"title":319,"_path":320},"Pms","/tr/integrations/pms",{"title":322,"_path":323},"LDAP Entegrasyonu","/tr/integrations/ldap",{"title":325,"_path":326},"API Entegrasyonu","/tr/integrations/api",{"title":328,"_path":329},"NTP Sunucu Entegrasyonu","/tr/integrations/ntp",{"title":331,"_path":332},"Zaman Damgası Sunucusu Entegrasyonu","/tr/integrations/time-stamp-server",{"title":43,"_path":334,"children":335},"/tr/management",[336,339,342,345,347],{"title":337,"_path":338},"Veri Yönetimi","/tr/management/data-management",{"title":340,"_path":341},"İletişim Yönetimi","/tr/management/contact-management",{"title":343,"_path":344},"Nesne Yönetimi","/tr/management/object",{"title":143,"_path":346},"/tr/management/command-line-interface",{"title":348,"_path":349},"Disk Kapasite Planlama Formülü","/tr/management/disk-management",{"title":149,"_path":351,"children":352},"/tr/license",[353],{"title":354,"_path":355},"Lisans ve Ajanlar","/tr/license/license",{"title":156,"_path":357,"children":358},"/tr/user-authentication",[359],{"title":156,"_path":360},"/tr/user-authentication/user-authentication",{"title":163,"_path":362,"children":363},"/tr/system",[364,367,370,372],{"title":365,"_path":366},"Yönetici Yönetimi","/tr/system/administrator",{"title":368,"_path":369},"Özellik Görünürlüğü","/tr/system/features-visibility",{"title":173,"_path":371},"/tr/system/update",{"title":373,"_path":374},"Sistem Ayarları","/tr/system/settings",{"title":179,"_path":376,"children":377},"/tr/practice",[378,381,384],{"title":379,"_path":380},"En Yüksek Bandwidth Kullanımı","/tr/practice/topbantwidthusage",{"title":382,"_path":383},"Top Bandwidth Kullanımı","/tr/practice/most-visited-websites",{"title":385,"_path":386},"Engellenen Trafiği İncele","/tr/practice/inspect-blocked-traffic",{"title":191,"_path":388,"children":389},"/tr/blog",[390,393,396,398,400,402,405,408],{"title":391,"_path":392},"Docker Swarm ile Yük Deneleme Yapılandırması","/tr/blog/load-balance-config",{"title":394,"_path":395},"AI Modülü ile Başlarken","/tr/blog/ai-module",{"title":201,"_path":397},"/tr/blog/how-to-config-fortigate-syslog",{"title":204,"_path":399},"/tr/blog/how-to-config-paloalto-syslog",{"title":207,"_path":401},"/tr/blog/how-to-config-sophos-syslog",{"title":403,"_path":404},"Minio Install","/tr/blog/minio-install",{"title":406,"_path":407},"Windows'ta Docker Desktop","/tr/blog/docker-desktop-on-windows",{"title":409,"_path":410},"Ubuntu Server'da Docker Kurulumu","/tr/blog/docker-on-ubuntu-server",{"_path":129,"_dir":412,"_draft":413,"_partial":413,"_locale":414,"title":128,"description":415,"body":416,"_type":570,"_id":571,"_source":572,"_file":573,"_stem":574,"_extension":575},"integrations",false,"","This section provides information on how to add an timestamp server to the Logger software.",{"type":417,"children":418,"toc":564},"root",[419,428,434,440,450],{"type":420,"tag":421,"props":422,"children":424},"element","h2",{"id":423},"what-is-timestamp",[425],{"type":426,"value":427},"text","What is Timestamp ?",{"type":420,"tag":429,"props":430,"children":431},"p",{},[432],{"type":426,"value":433},"The purpose of Timetamp is to prove that a data or document existed at a certain time.\nA timestamp server creates a timestamp of a document or transaction and cryptographically signs it. The purpose of a timestamp is to prove that data or a document existed at a certain time.",{"type":420,"tag":421,"props":435,"children":437},{"id":436},"add-timestamp-️",[438],{"type":426,"value":439},"Add Timestamp 🕰️",{"type":420,"tag":441,"props":442,"children":444},"callout",{"icon":443},"i-heroicons-exclamation-triangle",[445],{"type":420,"tag":429,"props":446,"children":447},{},[448],{"type":426,"value":449},"An Timestamp server is not required. When not integrated, Logger Tubitak Kamusm provides time stamps free of charge.",{"type":420,"tag":451,"props":452,"children":456},"u-card",{"className":453},[454,455],"mt-4:bg-gray-100","dark:bg-gray-800",[457,463,485],{"type":420,"tag":421,"props":458,"children":460},{"id":459},"how-to-use",[461],{"type":426,"value":462},"How To Use ?",{"type":420,"tag":429,"props":464,"children":465},{},[466,468,476,478,483],{"type":426,"value":467},"Go to the ",{"type":420,"tag":469,"props":470,"children":473},"u-badge",{"color":471,"variant":472},"primary","soft",[474],{"type":426,"value":475},"Management > Object > Timestamp Servers",{"type":426,"value":477}," and then click ",{"type":420,"tag":469,"props":479,"children":480},{"color":471,"variant":472},[481],{"type":426,"value":482},"Create New",{"type":426,"value":484}," button.",{"type":420,"tag":486,"props":487,"children":488},"ul",{},[489,514,524,534,544,554],{"type":420,"tag":490,"props":491,"children":492},"li",{},[493,498,500],{"type":420,"tag":469,"props":494,"children":495},{"color":471,"variant":472},[496],{"type":426,"value":497},"\nHost Url:\n",{"type":426,"value":499},"\n Timestamp server addres. \n",{"type":420,"tag":501,"props":502,"children":503},"strong",{},[504,506],{"type":426,"value":505},"EX : ",{"type":420,"tag":507,"props":508,"children":512},"a",{"href":509,"rel":510},"https://freetsa.org/tsr",[511],"nofollow",[513],{"type":426,"value":509},{"type":420,"tag":490,"props":515,"children":516},{},[517,522],{"type":420,"tag":469,"props":518,"children":519},{"color":471,"variant":472},[520],{"type":426,"value":521},"\nUsername:\n",{"type":426,"value":523},"\n Server's username.\n",{"type":420,"tag":490,"props":525,"children":526},{},[527,532],{"type":420,"tag":469,"props":528,"children":529},{"color":471,"variant":472},[530],{"type":426,"value":531},"\nPassword:\n",{"type":426,"value":533},"\n Server's password.\n",{"type":420,"tag":490,"props":535,"children":536},{},[537,542],{"type":420,"tag":469,"props":538,"children":539},{"color":471,"variant":472},[540],{"type":426,"value":541},"\nTimeout Ms:\n",{"type":426,"value":543},"\n Timestamp specifies how long it takes for the request sent to the server to be answered. If Timeout = 3000 ms and the timestamp server does not respond within 3 seconds, the operation is considered a failure and the Retry mechanism is activated.\n",{"type":420,"tag":490,"props":545,"children":546},{},[547,552],{"type":420,"tag":469,"props":548,"children":549},{"color":471,"variant":472},[550],{"type":426,"value":551},"\nRety Count:\n",{"type":426,"value":553},"\n Specifies how many times a request that failed due to timeout should be retried.\n",{"type":420,"tag":490,"props":555,"children":556},{},[557,562],{"type":420,"tag":469,"props":558,"children":559},{"color":471,"variant":472},[560],{"type":426,"value":561},"\nDescription:\n",{"type":426,"value":563},"\n Description of Timestamp server.\n",{"title":414,"searchDepth":565,"depth":565,"links":566},2,[567,568,569],{"id":423,"depth":565,"text":427},{"id":436,"depth":565,"text":439},{"id":459,"depth":565,"text":462},"markdown","content:en:7.Integrations:7.time-stamp-server.md","content","en/7.Integrations/7.time-stamp-server.md","en/7.Integrations/7.time-stamp-server","md",[577,674],{"_path":126,"_dir":412,"_draft":413,"_partial":413,"_locale":414,"title":125,"description":578,"body":579,"_type":570,"_id":671,"_source":572,"_file":672,"_stem":673,"_extension":575},"This section provides information on how to add an NTP server to the Logger software.",{"type":417,"children":580,"toc":666},[581,587,592,598,606],{"type":420,"tag":421,"props":582,"children":584},{"id":583},"what-is-ntp-server",[585],{"type":426,"value":586},"What is NTP Server ?",{"type":420,"tag":429,"props":588,"children":589},{},[590],{"type":426,"value":591},"The NTP Server is used to synchronize time during the backup and signing of logs.",{"type":420,"tag":421,"props":593,"children":595},{"id":594},"add-ntp-server-️",[596],{"type":426,"value":597},"Add NTP Server 🕰️",{"type":420,"tag":441,"props":599,"children":600},{"icon":443},[601],{"type":420,"tag":429,"props":602,"children":603},{},[604],{"type":426,"value":605},"An NTP server is not required. When not integrated, the Logger product uses the default NTP servers.",{"type":420,"tag":451,"props":607,"children":609},{"className":608},[454,455],[610,614,629],{"type":420,"tag":421,"props":611,"children":612},{"id":459},[613],{"type":426,"value":462},{"type":420,"tag":429,"props":615,"children":616},{},[617,618,623,624,628],{"type":426,"value":467},{"type":420,"tag":469,"props":619,"children":620},{"color":471,"variant":472},[621],{"type":426,"value":622},"Management > Object > NTP Servers",{"type":426,"value":477},{"type":420,"tag":469,"props":625,"children":626},{"color":471,"variant":472},[627],{"type":426,"value":482},{"type":426,"value":484},{"type":420,"tag":486,"props":630,"children":631},{},[632,647,656],{"type":420,"tag":490,"props":633,"children":634},{},[635,640,642],{"type":420,"tag":469,"props":636,"children":637},{"color":471,"variant":472},[638],{"type":426,"value":639},"\nNTP Server Name:\n",{"type":426,"value":641},"\n NTP connection addres. \n",{"type":420,"tag":501,"props":643,"children":644},{},[645],{"type":426,"value":646},"EX: time.google.com , time.windows.com , pool.ntp.org",{"type":420,"tag":490,"props":648,"children":649},{},[650,654],{"type":420,"tag":469,"props":651,"children":652},{"color":471,"variant":472},[653],{"type":426,"value":561},{"type":426,"value":655},"\n Description of NTP connection.\n",{"type":420,"tag":490,"props":657,"children":658},{},[659,664],{"type":420,"tag":469,"props":660,"children":661},{"color":471,"variant":472},[662],{"type":426,"value":663},"\nOrder:\n",{"type":426,"value":665},"\n If you add more than one Ntp server, it determines which one will run first.\n",{"title":414,"searchDepth":565,"depth":565,"links":667},[668,669,670],{"id":583,"depth":565,"text":586},{"id":594,"depth":565,"text":597},{"id":459,"depth":565,"text":462},"content:en:7.Integrations:6.ntp.md","en/7.Integrations/6.ntp.md","en/7.Integrations/6.ntp",{"_path":135,"_dir":675,"_draft":413,"_partial":413,"_locale":414,"title":134,"description":676,"body":677,"_type":570,"_id":1246,"_source":572,"_file":1247,"_stem":1248,"_extension":575},"management","This section provides information about import, export, external backup services and backup forensic sign under the Data management topic.",{"type":417,"children":678,"toc":1229},[679,685,697,703,710,715,721,727,732,750,756,762,780,786,804,810,815,848,854,859,902,908,941,947,954,1087,1093,1174,1180,1194,1200,1206,1211,1223],{"type":420,"tag":421,"props":680,"children":682},{"id":681},"_1-export-task",[683],{"type":426,"value":684},"1. Export Task 📤",{"type":420,"tag":429,"props":686,"children":687},{},[688,690,695],{"type":426,"value":689},"The Export task page allows you to view the exports you have already completed and the exports currently in progress.\nExport works through storage adapters. In order to start the export process, you must first define a storage adapter. Go to the ",{"type":420,"tag":501,"props":691,"children":692},{},[693],{"type":426,"value":694},"Object Management > Storage Adapters",{"type":426,"value":696}," documentation.",{"type":420,"tag":421,"props":698,"children":700},{"id":699},"_2-backup-forensic-sign",[701],{"type":426,"value":702},"2. Backup Forensic Sign 📥",{"type":420,"tag":704,"props":705,"children":707},"h3",{"id":706},"overview",[708],{"type":426,"value":709},"Overview 👀",{"type":420,"tag":429,"props":711,"children":712},{},[713],{"type":426,"value":714},"Our system securely collects, signs, and stores your organization's log records. This ensures the integrity and immutability of your logs.",{"type":420,"tag":704,"props":716,"children":718},{"id":717},"system-features",[719],{"type":426,"value":720},"System Features ✨",{"type":420,"tag":704,"props":722,"children":724},{"id":723},"log-collection-and-storage",[725],{"type":426,"value":726},"Log Collection and Storage",{"type":420,"tag":429,"props":728,"children":729},{},[730],{"type":426,"value":731},"The system segments log data into hourly chunks, where each chunk:",{"type":420,"tag":486,"props":733,"children":734},{},[735,740,745],{"type":420,"tag":490,"props":736,"children":737},{},[738],{"type":426,"value":739},"Logs in your system are automatically collected",{"type":420,"tag":490,"props":741,"children":742},{},[743],{"type":426,"value":744},"Collected logs are securely processed and stored",{"type":420,"tag":490,"props":746,"children":747},{},[748],{"type":426,"value":749},"All logs are stored in an encrypted format",{"type":420,"tag":704,"props":751,"children":753},{"id":752},"signing-process",[754],{"type":426,"value":755},"Signing Process 🔄",{"type":420,"tag":704,"props":757,"children":759},{"id":758},"real-time-signing",[760],{"type":426,"value":761},"Real-Time Signing",{"type":420,"tag":486,"props":763,"children":764},{},[765,770,775],{"type":420,"tag":490,"props":766,"children":767},{},[768],{"type":426,"value":769},"Your logs are automatically grouped at specified time intervals",{"type":420,"tag":490,"props":771,"children":772},{},[773],{"type":426,"value":774},"Each group is compressed, encrypted, and digitally signed",{"type":420,"tag":490,"props":776,"children":777},{},[778],{"type":426,"value":779},"Signed data is transferred to a secure storage area",{"type":420,"tag":704,"props":781,"children":783},{"id":782},"official-authority-signature",[784],{"type":426,"value":785},"Official Authority Signature",{"type":420,"tag":486,"props":787,"children":788},{},[789,794,799],{"type":420,"tag":490,"props":790,"children":791},{},[792],{"type":426,"value":793},"At the end of the day, all log groups are signed by official authorities for an additional layer of security",{"type":420,"tag":490,"props":795,"children":796},{},[797],{"type":426,"value":798},"By default, FreeTSA is used",{"type":420,"tag":490,"props":800,"children":801},{},[802],{"type":426,"value":803},"Optionally, local authorities such as Kamusm or TÜBİTAK can be used",{"type":420,"tag":704,"props":805,"children":807},{"id":806},"verification-process",[808],{"type":426,"value":809},"Verification Process ✅",{"type":420,"tag":429,"props":811,"children":812},{},[813],{"type":426,"value":814},"To check the integrity of your log records:",{"type":420,"tag":486,"props":816,"children":817},{},[818,828,838],{"type":420,"tag":490,"props":819,"children":820},{},[821,826],{"type":420,"tag":501,"props":822,"children":823},{},[824],{"type":426,"value":825},"Verification Time:",{"type":426,"value":827}," Verification can be performed after the end-of-day official signing process is completed",{"type":420,"tag":490,"props":829,"children":830},{},[831,836],{"type":420,"tag":501,"props":832,"children":833},{},[834],{"type":426,"value":835},"Verification Scope:",{"type":426,"value":837}," You can select the desired log group for verification",{"type":420,"tag":490,"props":839,"children":840},{},[841,846],{"type":420,"tag":501,"props":842,"children":843},{},[844],{"type":426,"value":845},"Verification Result:",{"type":426,"value":847}," The system checks whether the selected logs have been altered",{"type":420,"tag":704,"props":849,"children":851},{"id":850},"security-features",[852],{"type":426,"value":853},"Security Features 🔒",{"type":420,"tag":429,"props":855,"children":856},{},[857],{"type":426,"value":858},"The system continuously monitors storage efficiency:",{"type":420,"tag":486,"props":860,"children":861},{},[862,872,882,892],{"type":420,"tag":490,"props":863,"children":864},{},[865,870],{"type":420,"tag":501,"props":866,"children":867},{},[868],{"type":426,"value":869},"Encryption:",{"type":426,"value":871}," All logs are encrypted using industry-standard algorithms",{"type":420,"tag":490,"props":873,"children":874},{},[875,880],{"type":420,"tag":501,"props":876,"children":877},{},[878],{"type":426,"value":879},"Digital Signature:",{"type":426,"value":881}," Each log group is cryptographically signed",{"type":420,"tag":490,"props":883,"children":884},{},[885,890],{"type":420,"tag":501,"props":886,"children":887},{},[888],{"type":426,"value":889},"Timestamp:",{"type":426,"value":891}," Legal value is provided through timestamps obtained from official authorities",{"type":420,"tag":490,"props":893,"children":894},{},[895,900],{"type":420,"tag":501,"props":896,"children":897},{},[898],{"type":426,"value":899},"Integrity Check:",{"type":426,"value":901}," Mathematical proof ensures that the logs have not been altered",{"type":420,"tag":704,"props":903,"children":905},{"id":904},"use-cases-️",[906],{"type":426,"value":907},"Use Cases ✍️",{"type":420,"tag":486,"props":909,"children":910},{},[911,921,931],{"type":420,"tag":490,"props":912,"children":913},{},[914,919],{"type":420,"tag":501,"props":915,"children":916},{},[917],{"type":426,"value":918},"Audit:",{"type":426,"value":920}," Reliable log records for legal audits",{"type":420,"tag":490,"props":922,"children":923},{},[924,929],{"type":420,"tag":501,"props":925,"children":926},{},[927],{"type":426,"value":928},"Forensic Analysis:",{"type":426,"value":930}," Log records that can be used as evidence in court",{"type":420,"tag":490,"props":932,"children":933},{},[934,939],{"type":420,"tag":501,"props":935,"children":936},{},[937],{"type":426,"value":938},"Compliance:",{"type":426,"value":940}," Meeting regulatory requirements",{"type":420,"tag":704,"props":942,"children":944},{"id":943},"system-diagram",[945],{"type":426,"value":946},"System Diagram 🖧",{"type":420,"tag":948,"props":949,"children":951},"h4",{"id":950},"backupsign-flowchart",[952],{"type":426,"value":953},"Backup&Sign Flowchart",{"type":420,"tag":955,"props":956,"children":957},"prose-mermaid",{},[958],{"type":420,"tag":959,"props":960,"children":964},"pre",{"className":961,"code":962,"language":963,"meta":414,"style":414},"language-mermaid shiki shiki-themes material-theme-lighter material-theme material-theme-palenight","flowchart LR\n    A[TCP/UDP Log Source] --> B[MessageQ]\n    B --> C{Log Deployment}\n    C -->|Path 1| D[Database Insert]\n    C -->|Path 2| E[Sign Service]\n    E -->G[Create Chunk\u003Cbr/>-Compression\u003Cbr/>-Encryption\u003Cbr/>-SelfSign+TimeStamp]\n    G -->L\n    G -->H{End of the day?}\n    H -->|Yes| I[-Collect All Chunk Hashes\u003Cbr/>-Merge Hashes by Timestamp\u003Cbr/>-Sign with Official Authority FreeTSA/Kamusm/TÜBİTAK]\n    I --> J[Master Signature File]\n    J --> K[Upload to MinIO S3]\n    L[File+S3Metadata\u003Cbr/>-Timestamp\u003Cbr/>-Compression Algorithm\u003Cbr/>-Encryption Algorithm\u003Cbr/>-Data Size/Count\u003Cbr/>-Compression Ratio\u003Cbr/>- Hash SHA-256\u003Cbr/>-Digest/Sign]\n    L --> K\n","mermaid",[965],{"type":420,"tag":966,"props":967,"children":968},"code",{"__ignoreMap":414},[969,980,988,997,1006,1015,1024,1033,1042,1051,1060,1069,1078],{"type":420,"tag":970,"props":971,"children":974},"span",{"class":972,"line":973},"line",1,[975],{"type":420,"tag":970,"props":976,"children":977},{},[978],{"type":426,"value":979},"flowchart LR\n",{"type":420,"tag":970,"props":981,"children":982},{"class":972,"line":565},[983],{"type":420,"tag":970,"props":984,"children":985},{},[986],{"type":426,"value":987},"    A[TCP/UDP Log Source] --> B[MessageQ]\n",{"type":420,"tag":970,"props":989,"children":991},{"class":972,"line":990},3,[992],{"type":420,"tag":970,"props":993,"children":994},{},[995],{"type":426,"value":996},"    B --> C{Log Deployment}\n",{"type":420,"tag":970,"props":998,"children":1000},{"class":972,"line":999},4,[1001],{"type":420,"tag":970,"props":1002,"children":1003},{},[1004],{"type":426,"value":1005},"    C -->|Path 1| D[Database Insert]\n",{"type":420,"tag":970,"props":1007,"children":1009},{"class":972,"line":1008},5,[1010],{"type":420,"tag":970,"props":1011,"children":1012},{},[1013],{"type":426,"value":1014},"    C -->|Path 2| E[Sign Service]\n",{"type":420,"tag":970,"props":1016,"children":1018},{"class":972,"line":1017},6,[1019],{"type":420,"tag":970,"props":1020,"children":1021},{},[1022],{"type":426,"value":1023},"    E -->G[Create Chunk\u003Cbr/>-Compression\u003Cbr/>-Encryption\u003Cbr/>-SelfSign+TimeStamp]\n",{"type":420,"tag":970,"props":1025,"children":1027},{"class":972,"line":1026},7,[1028],{"type":420,"tag":970,"props":1029,"children":1030},{},[1031],{"type":426,"value":1032},"    G -->L\n",{"type":420,"tag":970,"props":1034,"children":1036},{"class":972,"line":1035},8,[1037],{"type":420,"tag":970,"props":1038,"children":1039},{},[1040],{"type":426,"value":1041},"    G -->H{End of the day?}\n",{"type":420,"tag":970,"props":1043,"children":1045},{"class":972,"line":1044},9,[1046],{"type":420,"tag":970,"props":1047,"children":1048},{},[1049],{"type":426,"value":1050},"    H -->|Yes| I[-Collect All Chunk Hashes\u003Cbr/>-Merge Hashes by Timestamp\u003Cbr/>-Sign with Official Authority FreeTSA/Kamusm/TÜBİTAK]\n",{"type":420,"tag":970,"props":1052,"children":1054},{"class":972,"line":1053},10,[1055],{"type":420,"tag":970,"props":1056,"children":1057},{},[1058],{"type":426,"value":1059},"    I --> J[Master Signature File]\n",{"type":420,"tag":970,"props":1061,"children":1063},{"class":972,"line":1062},11,[1064],{"type":420,"tag":970,"props":1065,"children":1066},{},[1067],{"type":426,"value":1068},"    J --> K[Upload to MinIO S3]\n",{"type":420,"tag":970,"props":1070,"children":1072},{"class":972,"line":1071},12,[1073],{"type":420,"tag":970,"props":1074,"children":1075},{},[1076],{"type":426,"value":1077},"    L[File+S3Metadata\u003Cbr/>-Timestamp\u003Cbr/>-Compression Algorithm\u003Cbr/>-Encryption Algorithm\u003Cbr/>-Data Size/Count\u003Cbr/>-Compression Ratio\u003Cbr/>- Hash SHA-256\u003Cbr/>-Digest/Sign]\n",{"type":420,"tag":970,"props":1079,"children":1081},{"class":972,"line":1080},13,[1082],{"type":420,"tag":970,"props":1083,"children":1084},{},[1085],{"type":426,"value":1086},"    L --> K\n",{"type":420,"tag":948,"props":1088,"children":1090},{"id":1089},"verify-flowchart",[1091],{"type":426,"value":1092},"Verify Flowchart",{"type":420,"tag":955,"props":1094,"children":1095},{},[1096],{"type":420,"tag":959,"props":1097,"children":1099},{"className":961,"code":1098,"language":963,"meta":414,"style":414},"flowchart LR\nQ[Select Chunk] --> R[End of day check]\n        R --> S[Get hash/sign\u003Cbr/>of the metadata\u003Cbr/>of the chunk]\n        S --> T[-Collect All Chunk Hashes]\n        T --> U[Merge Hash's by timestamp]\n        U --> V[Comparison with master sign]\n        V --> W{Does it match?}\n        W -->|Yes| X[Verify is succesful]\n        W -->|No| Y[Verify is faided]\n",[1100],{"type":420,"tag":966,"props":1101,"children":1102},{"__ignoreMap":414},[1103,1110,1118,1126,1134,1142,1150,1158,1166],{"type":420,"tag":970,"props":1104,"children":1105},{"class":972,"line":973},[1106],{"type":420,"tag":970,"props":1107,"children":1108},{},[1109],{"type":426,"value":979},{"type":420,"tag":970,"props":1111,"children":1112},{"class":972,"line":565},[1113],{"type":420,"tag":970,"props":1114,"children":1115},{},[1116],{"type":426,"value":1117},"Q[Select Chunk] --> R[End of day check]\n",{"type":420,"tag":970,"props":1119,"children":1120},{"class":972,"line":990},[1121],{"type":420,"tag":970,"props":1122,"children":1123},{},[1124],{"type":426,"value":1125},"        R --> S[Get hash/sign\u003Cbr/>of the metadata\u003Cbr/>of the chunk]\n",{"type":420,"tag":970,"props":1127,"children":1128},{"class":972,"line":999},[1129],{"type":420,"tag":970,"props":1130,"children":1131},{},[1132],{"type":426,"value":1133},"        S --> T[-Collect All Chunk Hashes]\n",{"type":420,"tag":970,"props":1135,"children":1136},{"class":972,"line":1008},[1137],{"type":420,"tag":970,"props":1138,"children":1139},{},[1140],{"type":426,"value":1141},"        T --> U[Merge Hash's by timestamp]\n",{"type":420,"tag":970,"props":1143,"children":1144},{"class":972,"line":1017},[1145],{"type":420,"tag":970,"props":1146,"children":1147},{},[1148],{"type":426,"value":1149},"        U --> V[Comparison with master sign]\n",{"type":420,"tag":970,"props":1151,"children":1152},{"class":972,"line":1026},[1153],{"type":420,"tag":970,"props":1154,"children":1155},{},[1156],{"type":426,"value":1157},"        V --> W{Does it match?}\n",{"type":420,"tag":970,"props":1159,"children":1160},{"class":972,"line":1035},[1161],{"type":420,"tag":970,"props":1162,"children":1163},{},[1164],{"type":426,"value":1165},"        W -->|Yes| X[Verify is succesful]\n",{"type":420,"tag":970,"props":1167,"children":1168},{"class":972,"line":1044},[1169],{"type":420,"tag":970,"props":1170,"children":1171},{},[1172],{"type":426,"value":1173},"        W -->|No| Y[Verify is faided]\n",{"type":420,"tag":421,"props":1175,"children":1177},{"id":1176},"_3-external-backup-service",[1178],{"type":426,"value":1179},"3. External Backup Service ↗",{"type":420,"tag":429,"props":1181,"children":1182},{},[1183,1185,1192],{"type":426,"value":1184},"Extarnal backup service is a service to transfer log records to an external storage. To create an external backup service, a source is selected and a new storage adapter is created. Below you can see the storage adapter that the logger integrates with. For detailed information on how to add a storage adapter, see the ",{"type":420,"tag":507,"props":1186,"children":1189},{"href":1187,"rel":1188},"http://localhost:3000/en/management/object",[511],[1190],{"type":426,"value":1191},"storage adapter",{"type":426,"value":1193}," section in the following document.",{"type":420,"tag":1195,"props":1196,"children":1199},"storage-adapter-modal",{":providers":1197,"title":1198,"trigger-text":1198},"[{\"name\":\"FTPS\",\"logo\":\"/images/logos/ftps.png\"},{\"name\":\"AWS S3\",\"logo\":\"/images/logos/aws.png\"},{\"name\":\"Azure Blob Storage\",\"logo\":\"/images/logos/azure.png\"},{\"name\":\"MinIO\",\"logo\":\"/images/logos/minio.png\"},{\"name\":\"SFTP Storage\",\"logo\":\"/images/logos/sftp.png\"}]","Storage Adapter List",[],{"type":420,"tag":421,"props":1201,"children":1203},{"id":1202},"_4-settings-️",[1204],{"type":426,"value":1205},"4. Settings ⚙️",{"type":420,"tag":429,"props":1207,"children":1208},{},[1209],{"type":426,"value":1210},"In the Settings tab, you can change some properties of the containers to which the logger software is connected. The features you can intervene in this tab are limited. You can use the CLI module for more detailed configurations.",{"type":420,"tag":429,"props":1212,"children":1213},{},[1214,1216],{"type":426,"value":1215},"👉 ",{"type":420,"tag":507,"props":1217,"children":1220},{"href":1218,"rel":1219},"http://localhost:3000/en/management/command-line-interface",[511],[1221],{"type":426,"value":1222},"How to use CLI ?",{"type":420,"tag":1224,"props":1225,"children":1226},"style",{},[1227],{"type":426,"value":1228},"html .light .shiki span {color: var(--shiki-light);background: var(--shiki-light-bg);font-style: var(--shiki-light-font-style);font-weight: var(--shiki-light-font-weight);text-decoration: var(--shiki-light-text-decoration);}html.light .shiki span {color: var(--shiki-light);background: var(--shiki-light-bg);font-style: var(--shiki-light-font-style);font-weight: var(--shiki-light-font-weight);text-decoration: var(--shiki-light-text-decoration);}html .default .shiki span {color: var(--shiki-default);background: var(--shiki-default-bg);font-style: var(--shiki-default-font-style);font-weight: var(--shiki-default-font-weight);text-decoration: var(--shiki-default-text-decoration);}html .shiki span {color: var(--shiki-default);background: var(--shiki-default-bg);font-style: var(--shiki-default-font-style);font-weight: var(--shiki-default-font-weight);text-decoration: var(--shiki-default-text-decoration);}html .dark .shiki span {color: var(--shiki-dark);background: var(--shiki-dark-bg);font-style: var(--shiki-dark-font-style);font-weight: var(--shiki-dark-font-weight);text-decoration: var(--shiki-dark-text-decoration);}html.dark .shiki span {color: var(--shiki-dark);background: var(--shiki-dark-bg);font-style: var(--shiki-dark-font-style);font-weight: var(--shiki-dark-font-weight);text-decoration: var(--shiki-dark-text-decoration);}",{"title":414,"searchDepth":565,"depth":565,"links":1230},[1231,1232,1244,1245],{"id":681,"depth":565,"text":684},{"id":699,"depth":565,"text":702,"children":1233},[1234,1235,1236,1237,1238,1239,1240,1241,1242,1243],{"id":706,"depth":990,"text":709},{"id":717,"depth":990,"text":720},{"id":723,"depth":990,"text":726},{"id":752,"depth":990,"text":755},{"id":758,"depth":990,"text":761},{"id":782,"depth":990,"text":785},{"id":806,"depth":990,"text":809},{"id":850,"depth":990,"text":853},{"id":904,"depth":990,"text":907},{"id":943,"depth":990,"text":946},{"id":1176,"depth":565,"text":1179},{"id":1202,"depth":565,"text":1205},"content:en:8.management:1.data-management.md","en/8.management/1.data-management.md","en/8.management/1.data-management",1775654251490]