Documentation Index
Fetch the complete documentation index at: https://docs.esperr.com/llms.txt
Use this file to discover all available pages before exploring further.
How It Works
When you use Esper, your traffic data flows through the Beacon Server:- Traffic Collection: Your events are automatically forwarded to the Beacon Server
- Authentication: Only traffic with valid API keys is accepted
- Processing: Events are validated and prepared for analysis
- Policy Evaluation: Events are evaluated against your deployed policies
Sending Traffic to Beacon
Automatic Collection (Recommended)
The easiest way to send traffic is usingesper capture:
- Monitors your network traffic automatically
- Forwards relevant events to the Beacon Server
- Requires zero changes to your applications
- Continues working even if Esper has issues (fail-safe design)
Cloud HTTP
If the customer is usingcloud, send the observed request or event to
Esper over HTTP and wait for the mitigation context in the response.
AuthenticationCloud ingest uses the
x-esper-api-key header. The customer only needs their
Esper API key to start sending traffic.Direct API Integration
For custom integrations, send the same structured event shape directly to the Beacon ingest API:Security
- Encrypted Transport: All traffic uses TLS encryption
- API Key Authentication: Each request must include your unique API key
- Rate Limiting: Automatic protection against traffic spikes
- Data Isolation: Your events are completely isolated from other customers
Performance
The Beacon Server is designed to handle high-volume traffic:- Automatically scales during traffic spikes
- Batching support for improved efficiency
- Geographic distribution for low latency
Monitoring
You can monitor your Beacon Server usage in the Esper dashboard:- Events received per second
- Authentication failures
- Processing latency
- Error rates