Veltrix SecOps Documentation

Welcome to the Veltrix SecOps documentation. This guide will help you get started with the platform and explore its features. If you need additional assistance, please contact our support team.

Security Automation Platform Overview

Veltrix SecOps is a comprehensive security operations platform designed to streamline security orchestration, security configuration management, and automated threat detection with robust version control for security infrastructure.

Key Features

  • Centralized security operations dashboard
  • Security orchestration with integrated workflows
  • Security compliance automation with policy-as-code
  • Zero-trust architecture with security approval workflows
  • DevSecOps automation with Infrastructure as Code (IaC) security

Deployment Options

  • Kubernetes deployment with Site Reliability Engineering (SRE) and Security Reliability Engineering (SecuRE) principles
  • Virtual machines deployment with security configuration controls
  • Single instance for teams implementing security configuration management
  • Clustered deployment for enterprise security automation needs
  • Custom integration with existing security infrastructure and version control systems

Quick Start Guide

Follow these steps to quickly get started with Veltrix SecOps:

  1. Sign up for an account

    Visit app.veltrixsecops.com and create your account.

  2. Choose your deployment type

    Select between Kubernetes or Virtual Machines deployment based on your infrastructure.

  3. Configure your security tools

    Follow the setup wizard to connect your existing security tools.

  4. Set up compliance frameworks

    Select the compliance frameworks relevant to your organization.

  5. Invite team members

    Add team members and configure access controls.

Pro Tip

For the fastest setup, use our CLI tool by running npm install -g veltrix-cli and then veltrix init.

Installation Options

Veltrix SecOps offers several installation options to suit your organization's needs.

Deployment Type Best For Requirements
Single Kubernetes Instance Small teams with basic security needs Kubernetes cluster, 2 CPU cores, 4GB RAM
Clustered Kubernetes Mid-to-large teams with advanced needs Kubernetes cluster, 8 CPU cores, 16GB RAM
Single VM Small teams without Kubernetes Linux VM, 4 CPU cores, 8GB RAM
Clustered VMs Organizations with VM infrastructure 5+ Linux VMs, 4 CPU cores each, 8GB RAM each

Installation Commands

Kubernetes Installation

kubectl create namespace veltrix
helm repo add veltrix https://charts.veltrixsecops.com
helm install veltrix veltrix/secops -n veltrix

Virtual Machine Installation

curl -sSL https://install.veltrixsecops.com | bash
sudo systemctl enable veltrix
sudo systemctl start veltrix

Dashboard

The Veltrix SecOps dashboard provides a centralized view of your security posture, enabling quick access to critical information and tools.

Key Dashboard Features

  • Security Score: Real-time security posture assessment
  • Active Alerts: Critical security events requiring attention
  • Compliance Status: Current compliance status for all frameworks
  • Tool Status: Health and status of integrated security tools
  • Resource Utilization: System performance metrics

For detailed dashboard configuration, visit:

Dashboard Configuration Guide →