How It Works
Learn about the different ways to generate and send logs to your security platform
Logs from the Catalog or your uploads are processed: events are extracted, normalized, and converted to the format your destination expects. They are then sent directly to your configured security platform—no agents or ingestion endpoints required. See Supported Log Types for accepted formats.
Logcannon
On-demand. No agents. Direct to your configured destination.
Traditional
Real-time stream. Requires agents and an ingestion pipeline.
Destination compatibility
Catalog
Browse and use pre-populated log samples from trusted sources. See Catalog Sources for the list of repositories. The Catalog provides access to a curated collection of real-world log samples that are pre-processed and ready to use for use in your security platform.
How it works
- Browse the catalog to find log samples by type, MITRE ATT&CK® tactic or technique, or search terms
- Select a log entry to view its metadata (event count, file size, description)
- Configure your destination settings
- Submit the log for processing - it will be sent directly to your security platform
- Track the processing status and view results in your security platform
Note
Insert
Upload your own log files for processing and analysis. The Insert feature allows you to upload log files for processing and sending to your security platform. This is useful for testing detections with logs from your own environment.
How it works
- Upload a log file from your local system
- Configure your destination settings
- The file is securely uploaded and processed
- Events are extracted, normalized, and sent to your configured security platform
- Monitor processing status and verify logs appear in your security platform
Supported formats
Common Workflow
Regardless of which method you use, the general workflow is the same:
- Configure your destination in Settings (see Configuration)
- Select or create your log source (Catalog or Upload)
- Submit for processing
- Monitor the job status
- Verify logs appear in your security platform
- Test your detections and queries