Welcome to the Seerflow Guide¶
Seerflow is a streaming, entity-centric log intelligence agent that detects operational failures and security threats across log sources. It combines traditional ML for bulk detection with LLMs for edge cases and root cause analysis.
See what single sources can't.
Who is this guide for?¶
Choose your path
New to security tooling? Start here:
- Security Concepts Primer — learn the fundamentals
- Architecture Overview — how Seerflow works
- Detection Overview — what Seerflow detects
- Operations Guide — running Seerflow
Deploying or tuning Seerflow? Go here:
- Architecture — pipeline and data flow
- Detection Deep Dives — understand each detector
- Tuning Guide — reduce false positives
- Configuration Reference — every parameter
Extending Seerflow? Start with:
- Architecture — system internals
- Entity Graph — graph data model
- Detection Internals — add detectors
- Testing Guide — quality gates
How Seerflow Works¶
graph TD
A[Log Sources] --> B[Receivers]
B --> C[Parsing & Drain3]
C --> D[Entity Extraction]
D --> E[Detection Ensemble]
E --> F[Correlation Engine]
F --> G[Alerting]
G --> H[Feedback Loop]
H -->|Threshold Adjustment| E
| Component | Purpose |
|---|---|
| Receivers | Ingest logs from syslog, files, OTLP, webhooks |
| Parsing | Drain3 template extraction, field normalization |
| Entity Extraction | Identify IPs, users, hosts, processes, files, domains |
| Detection Ensemble | HST, Holt-Winters, CUSUM, Markov, DSPOT thresholds |
| Correlation | Sigma rules, temporal windows, kill chain, graph analysis |
| Alerting | Webhooks (Slack, Teams, PagerDuty), dedup, feedback |
Guide Structure¶
Every concept page follows a three-layer structure:
- Theory — what it is, why it matters
- Seerflow Implementation — how it's built, code references
- Practical Examples — real scenarios, config samples, expected output
Source Code¶
Seerflow is open source: github.com/seerflow/seerflow