Visibility

Airlock’s new Visibility features — Analytics, Charts, and Timeline — help you gain detailed perspectives of your group’s security health by providing filtering tools to navigate your issues across multiple groups in a single view.

Analytics

Analytics helps you query event data in Airlock, across any number of groups within your organization. It enables you to uncover patterns and trends in your events’ data. For example, you can aggregate event count by stack.filename and stack.function, and then browse the data as a table, bar chart, or line graph. For more information on how to use the query builder and event fields, see the full documentation on Analytics.

Charts

Charts are various data visualizations of your errors across your organization — including graphs of your incidents, geographic mapping, and lists of browsers. Charts allow you to drill into data by selecting points of interest.

Overall View of Application

Each graph and visualization helps uncover crucial patterns and trends about where your users are hitting malicious sites.

Dive into Specific Groups

Filter your data with group-specific parameters.

Filter by Environment

Distill needs by choosing explicit environments.

Refine by Time Period

Define distinct time periods for a more clear-cut glimpse.

Timeline

The Timeline View uncovers your raw error stream for any group of groups, including time range. To investigate a spike, select the spike in your Timeline View graph to narrow your timeframe. Drill down into any individual event to see issues related to that event.

The updated Search helps you get specific with Issues and Timeline views.

  • Wildcards: use the * operator as a placeholder for specific characters or strings. For example, user.email:*@example.com
  • Negation: use the ! operator to exclude terms. For example, !user.email:user@example.com
  • Advanced properties: search on advanced event properties like stack (including stack.filename, stack.module, etc.), as well as geo (including geo.country_code, geo.city, etc.).

For more information on syntax and searchable properties, see the full Search documentation.