Integrations
DataSense seamlessly integrates with your existing infrastructure. We are continually expanding our list of supported integrations. Explore our supported sources and destinations below.
Sources
Syslog
Collect logs from network devices, firewalls, and Linux systems via TCP or UDP.
Apply drop or allow rules on any field — including source IP, facility, or message content.
Apply drop or allow rules on any field — including source IP, facility, or message content.
Windows Servers / Hosts
Collect logs from Windows event channels such as Security, Application, and System via agent or WinRM.
Filter on any field — Event ID, user, hostname, logon type, or custom attributes — before processing.
Filter on any field — Event ID, user, hostname, logon type, or custom attributes — before processing.
Cisco
Ingest syslog or NetFlow logs from Cisco routers, switches, and firewalls.
Supports protocol-level parsing and conditional forwarding based on log patterns or metadata.
Supports protocol-level parsing and conditional forwarding based on log patterns or metadata.
Palo Alto
Capture traffic and threat logs from Palo Alto Networks devices.
Route logs based on any field — such as action, severity, or destination zone.
Route logs based on any field — such as action, severity, or destination zone.
Checkpoint
Ingest logs from Checkpoint firewalls for policy audit, access, and event visibility.
Supports custom enrichment and transformation workflows.
Supports custom enrichment and transformation workflows.
Fortinet
Integrate with FortiGate and FortiAnalyzer devices via syslog.
Logs can be routed or dropped using full predicate and regex support.
Logs can be routed or dropped using full predicate and regex support.
Juniper
Receive syslog or structured logs from Juniper appliances.
Apply field-based filtering and optional tagging before export.
Apply field-based filtering and optional tagging before export.
Elastic (Source)
Query existing Elastic indices for replay, reprocessing, or migration.
Field filtering and enrichment applies the same as for live sources.
Field filtering and enrichment applies the same as for live sources.
Linux Hosts
Tail application and system logs from Linux machines.
Use pattern matching or metadata to conditionally process events.
Use pattern matching or metadata to conditionally process events.
Cloud Based
Ingest logs from cloud APIs and SaaS platforms (e.g., AWS, Azure, M365).
Transform and route based on payload content or API metadata.
Transform and route based on payload content or API metadata.
Destinations
Elastic
Export datasets to your Elasticsearch instance.
Supports HTTPS, index template mapping, authentication, and selective field output for storage efficiency.
Supports HTTPS, index template mapping, authentication, and selective field output for storage efficiency.
Splunk
Forward logs to Splunk using HTTP Event Collector (HEC) or raw TCP.
Use field-level filtering and log shaping to reduce ingestion volume and cost.
Use field-level filtering and log shaping to reduce ingestion volume and cost.
AWS S3
Push filtered or raw logs to Amazon S3 for long-term storage, backup, or data lake integration.
Configure paths, access controls, and retention settings.
Configure paths, access controls, and retention settings.
Need a Specific Integration?
We are continually expanding our list of supported integrations. Contact us to discuss custom integrations or to request support for your preferred platform.
Request Integration