Skip to main content
Version: Next

User Guides

These usage guides walk you through typical Tenzir use cases.

Datasets

Throughout the guides, we use publicly available datasets so that you can follow along.

M57

The M57 Patents Scenario contains large amounts of diverse network traffic. We enriched the PCAP from Nov 18, 2009, by adding malicious traffic from malware-traffic-analysis.net. We adjusted all packet timestamp to 2021. Thereafter, we ran Zeek v5.2.0 and Suricata 6.0.10 to obtain structured logs.

The dataset includes the following files:

For the following examples we assume that you have imported the demo data in your node using the following two pipelines. First the Suricata logs:

load_http "https://storage.googleapis.com/tenzir-datasets/M57/suricata.json.zst"
decompress "zstd"
read_suricata
where @name != "suricata.stats"
import

Then the Zeek logs:

load_http "https://storage.googleapis.com/tenzir-datasets/M57/zeek-all.log.zst"
decompress "zstd"
read_zeek_tsv
import

Note that the demo node already comes with an installed package that ingests this data for you.