Kron Telemetry Pipeline solution simplifies communication between multiple sources and destinations, allowing you to efficiently manage your data and streamline observability tasks. With our telemetry pipeline solution, you can send data from the same sources to various destinations, such as SIEM and log management tools.
Forward multiple data sources to various destinations without the need for additional agents. Efficiently send noise-free and transformed data to the appropriate destinations while routing raw data to cost-effective long-term storage like S3. Retain a full-fidelity copy in a low-cost data lake for later rehydration when needed.
Reduce up to 50% of streaming log volume for cost control and performance improvement purposes. Remove duplicate fields, null values, and any insignificant elements by configuring with low-code interface. Apply sampling to discard repetitive events, or deduplicate logs to reduce ingested volume.
Enhance streaming logs with contextual data to improve visibility on observability platforms. Adding threat intelligence information helps SIEM tools for root-cause analysis or threat hunting. Data-in-motion enrichment reduces the post-processing overhead for destination tools.
All infrastructure and security operation teams are seeking to explore more data sources to gain a comprehensive understanding of their on-prem and cloud infrastructures. To extract more insights and actionable data, they need the ability to transfer the same data to multiple tools and destinations without having to install numerous new agents for each additional tool. Additionally, there is a growing need for longer data retention, driven by regulatory requirements and potential forensic analysis.
However, the influx of more log data can lead to increased, infrastructure and licensing costs, primarily due to the noise generated by logs from various infrastructure domains.
To manage and mitigate these costs, streaming log data can be reduced and reshaped according to each destinations needs as it flows through the pipelines. These reshaping tasks can be anything like parsing, reformatting, enriching, and masking of Personal Identification Information (PII) or simply filtering out noisy data using various transformation functions provided by the solution.