# Tero Documentation ## Docs - [Authentication](https://docs.usetero.com/account-management/authentication.md): SSO, social login, and directory sync - [Data Quality SLOs](https://docs.usetero.com/account-management/data-quality-slos.md): Measure data quality and set targets - [Multi-Account](https://docs.usetero.com/account-management/multi-account.md): Complete data separation between accounts - [Account Management](https://docs.usetero.com/account-management/overview.md): Teams, access, and organizational structure - [Teams](https://docs.usetero.com/account-management/teams.md): Access and ownership for your engineering teams - [Workspaces](https://docs.usetero.com/account-management/workspaces.md): Shared catalog, separate policies - [Architecture](https://docs.usetero.com/edge/architecture.md): How Edge is built and why it's fast - [Concepts](https://docs.usetero.com/edge/concepts.md): Core concepts and mental models for working with Edge - [Edge](https://docs.usetero.com/edge/distributions/all.md): Full Edge distribution supporting all protocols - [Edge Datadog](https://docs.usetero.com/edge/distributions/datadog.md): Edge distribution for Datadog log and metric ingestion - [Edge OTLP](https://docs.usetero.com/edge/distributions/otlp.md): Edge distribution for OpenTelemetry Protocol - [Config](https://docs.usetero.com/edge/edge-reference/config.md): Complete configuration reference for Edge - [Operations](https://docs.usetero.com/edge/edge-reference/operations.md): Running Edge in production: logging, health checks, resource requirements - [Edge](https://docs.usetero.com/edge/github-edge.md) - [Policy Spec](https://docs.usetero.com/edge/github-policy.md) - [Overview](https://docs.usetero.com/edge/overview.md): A lightweight telemetry proxy for policy-based filtering and transformation - [Log Filter](https://docs.usetero.com/edge/policy-reference/log-filter.md): Filter logs by severity, content, attributes, and more - [Log Transform](https://docs.usetero.com/edge/policy-reference/log-transform.md): Redact, remove, rename, and add log fields - [Metric Filter](https://docs.usetero.com/edge/policy-reference/metric-filter.md): Filter metrics by name, type, and attributes - [Metric Transform](https://docs.usetero.com/edge/policy-reference/metric-transform.md): Transform metric data before forwarding - [Trace Filter](https://docs.usetero.com/edge/policy-reference/trace-filter.md): Filter distributed traces by span attributes - [Quickstart](https://docs.usetero.com/edge/quickstart.md): Get Edge running in 5 minutes - [Anthropic](https://docs.usetero.com/integrations/anthropic.md): Use your own Anthropic API key for AI classification - [AWS Bedrock](https://docs.usetero.com/integrations/aws-bedrock.md): Use AWS Bedrock for AI classification - [Datadog](https://docs.usetero.com/integrations/datadog.md): Connect Tero to your Datadog account - [Datadog Agent](https://docs.usetero.com/integrations/datadog-agent.md): Deploy Edge alongside the Datadog Agent on Kubernetes - [Datadog Lambda Extension](https://docs.usetero.com/integrations/datadog-lambda-extension.md): Filter Lambda function telemetry with the Tero Datadog Lambda Extension - [Datadog Lambda Forwarder](https://docs.usetero.com/integrations/datadog-lambda-forwarder.md): Filter AWS logs with the Tero Edge Lambda Extension - [GitHub](https://docs.usetero.com/integrations/github.md): Connect Tero to your GitHub repositories - [OpenAI](https://docs.usetero.com/integrations/openai.md): Use your own OpenAI API key for AI classification - [OpenTelemetry Collector](https://docs.usetero.com/integrations/otel-collector.md): Apply policies to logs in the OpenTelemetry Collector - [Prometheus](https://docs.usetero.com/integrations/prometheus.md): Deploy Edge as a sidecar proxy for Prometheus metrics scraping on Kubernetes - [Splunk](https://docs.usetero.com/integrations/splunk.md): Connect Tero to your Splunk instance - [How Tero works](https://docs.usetero.com/introduction/how-tero-works.md): Connect, build the catalog, review policies, enforce - [How Tero compares](https://docs.usetero.com/introduction/tero-versus.md): Where Tero fits in your stack - [What is Tero?](https://docs.usetero.com/introduction/what-is-tero.md): A control plane for observability data - [Log Events](https://docs.usetero.com/master-catalog/log-events.md): How Tero turns billions of logs into something you can reason about - [Metrics](https://docs.usetero.com/master-catalog/metrics.md): What Tero knows about your metrics - [Master Catalog](https://docs.usetero.com/master-catalog/overview.md): The single source of truth for all your telemetry - [Services](https://docs.usetero.com/master-catalog/services.md): How Tero discovers and understands your services - [Trace Spans](https://docs.usetero.com/master-catalog/trace-spans.md): How Tero understands the operations that make up your requests - [Accidental debug statements](https://docs.usetero.com/policies/categories/accidental-debug-statements.md): Developer debugging garbage that shipped to production - [Bot traffic](https://docs.usetero.com/policies/categories/bot-traffic.md): Log events where bot filtering is possible - [Burst protection](https://docs.usetero.com/policies/categories/burst-protection.md): Circuit breakers for logs that explode during failures - [Debug mode left on](https://docs.usetero.com/policies/categories/debug-mode-left-on.md): Verbose logging enabled for troubleshooting, never disabled - [Duplicate fields](https://docs.usetero.com/policies/categories/duplicate-fields.md): The same field stored in multiple locations - [Excessive payloads](https://docs.usetero.com/policies/categories/excessive-payloads.md): Response bodies, large objects, and data blobs in logs - [Health checks](https://docs.usetero.com/policies/categories/health-checks.md): Readiness probes, liveness probes, synthetic monitoring - [High cardinality tags](https://docs.usetero.com/policies/categories/high-cardinality-tags.md): Metric tags with unbounded values that explode storage - [Instrumentation bloat](https://docs.usetero.com/policies/categories/instrumentation-bloat.md): SDK and collector metadata no one asked for - [Logs in hot path](https://docs.usetero.com/policies/categories/logs-in-hot-path.md): Log statements in middleware, loops, or high-frequency code - [Malformed data](https://docs.usetero.com/policies/categories/malformed-data.md): Binary blobs, corrupted output, unparseable logs - [PII leakage](https://docs.usetero.com/policies/categories/pii-leakage.md): Sensitive data that ended up in logs - [Create tickets](https://docs.usetero.com/policies/enforcement/create-tickets.md): Assign work to engineers in Linear or GitHub Issues - [Enforce at edge](https://docs.usetero.com/policies/enforcement/edge.md): Execute policies before data leaves your network - [Notify](https://docs.usetero.com/policies/enforcement/notify.md): Alert teams in Slack or email - [Open PRs](https://docs.usetero.com/policies/enforcement/open-prs.md): Fix instrumentation at the source with pull requests - [Enforcement](https://docs.usetero.com/policies/enforcement/overview.md): Where and how policies get enforced - [Enforce in provider](https://docs.usetero.com/policies/enforcement/provider.md): Configure exclusion filters and routing rules via API - [Set SLOs](https://docs.usetero.com/policies/enforcement/set-slos.md): Quality targets for teams to meet - [Management](https://docs.usetero.com/policies/management.md): Where policies live and how they sync - [Policies](https://docs.usetero.com/policies/overview.md): Data quality as code - [Quickstart](https://docs.usetero.com/quickstart.md): Your first policy in minutes - [Security Architecture](https://docs.usetero.com/trust/architecture.md): End-to-end security architecture, trust boundaries, and enforcement model. - [Compliance and Assurance](https://docs.usetero.com/trust/assurance/compliance-and-assurance.md): Current compliance status and available assurance artifacts. - [Documents and Requests](https://docs.usetero.com/trust/assurance/documents-and-requests.md): How to request security documentation and assurance artifacts. - [Subprocessors and Third Parties](https://docs.usetero.com/trust/assurance/subprocessors-third-parties.md): Third-party services used in hosted deployments and their processing roles. - [AI Data Controls](https://docs.usetero.com/trust/controls/ai-data-controls.md): How AI provider paths are configured, what data is sent, and deployment-dependent control options. - [Data Handling](https://docs.usetero.com/trust/controls/data-handling.md): What data Tero handles, what is stored, and how retention and deletion work. - [Encryption and Key Management](https://docs.usetero.com/trust/controls/encryption-key-management.md): Encryption in transit and at rest, key ownership model, rotation, and key event visibility. - [Identity and Access](https://docs.usetero.com/trust/controls/identity-access.md): Authentication, authorization, credential scope, and access lifecycle controls. - [Incident Response and Resilience](https://docs.usetero.com/trust/controls/incident-response.md): Detection, triage, communication, and recovery expectations for security incidents. - [Network Security](https://docs.usetero.com/trust/controls/network-security.md): External exposure model, transport security, edge protections, and connectivity options. - [Secure Development](https://docs.usetero.com/trust/controls/secure-development.md): How code, dependencies, secrets, and deployments are controlled in the SDLC. - [Overview](https://docs.usetero.com/trust/overview.md): Security, privacy, and compliance posture for Tero-hosted and self-hosted deployments. - [Authentication and Password Standard](https://docs.usetero.com/trust/policies/authentication-password-standard.md): Authentication, password, MFA, and session-control baseline for user access. - [Cloud Services Security Standard](https://docs.usetero.com/trust/policies/cloud-services-security-standard.md): Approval and operating security baseline for cloud services used to deliver Tero. - [Data Classification](https://docs.usetero.com/trust/policies/data-classification.md): Classification levels and required handling controls. - [Data Retention](https://docs.usetero.com/trust/policies/data-retention.md): Retention periods and deletion behavior for core hosted data classes. - [DLP Standard](https://docs.usetero.com/trust/policies/dlp-standard.md): Current and planned controls for preventing and detecting sensitive data exfiltration risk. - [Encryption Standard](https://docs.usetero.com/trust/policies/encryption-standard.md): Encryption and key-management requirements for hosted deployments. - [Policies](https://docs.usetero.com/trust/policies/index.md): Policy library for trust controls and handling standards. - [Reviewer Map](https://docs.usetero.com/trust/reviewer-map.md): Fast lookup for common security questionnaire topics. - [Shared Responsibility](https://docs.usetero.com/trust/shared-responsibility.md): Control ownership between Tero and customers in hosted and self-hosted deployments. ## OpenAPI Specs - [openapi](https://docs.usetero.com/api-reference/openapi.json)