The Traversal Processor is a high-performance telemetry ingestion and processing service that receives telemetry data from your infrastructure, and extracts and indexes structured data into the Traversal platform. Today, the Traversal Processor accepts logs data only, via HTTP endpoints and OpenTelemetry Protocol (OTLP) over both gRPC and HTTP. The Traversal Processor ships as a single container image can be deployed via a Helm chart and a Values file provided by Traversal. The Traversal Processor is designed to operate as a horizontally scalable service, and does not require coordination across instances.Documentation Index
Fetch the complete documentation index at: https://docs.traversal.com/llms.txt
Use this file to discover all available pages before exploring further.
If your environment restricts outbound traffic, see Network allowlisting for the IPs to allow before deploying.
Deployment
- Use Helm on K8s
A Helm-based Kubernetes deployment is composed of three artifacts. While the chart is published openly, the image requires authentication. The values file also requires authentication, since it carries credentials issued for your deployment.The pulled chart includes a
All other fields — field extraction, redaction, replica count, resource requests, observability, scheduling — are optional and have sensible defaults.The pod exposes a health endpoint at When using
Container image
Public, built and published by Traversal.
Helm chart
Public OCI artifact. Generic across all deployments.
Values file
Per-deployment. Pulled with a Traversal-issued token.
Container image
Traversal builds and publishes the Traversal Processor image to the traversalext/traversal-processor repository on Docker Hub. The image is private, so you will have to authenticate with Docker Hub.If your security policy requires it, you can mirror the published image into an internal registry — overrideimage.repository (and image.pullSecrets, if your registry requires authentication) in your values when installing the chart.Helm chart
The Helm chart is published as a public OCI artifact atoci://registry-1.docker.io/traversalext/traversal-processor-charts. The chart is generic across all deployments — it contains no customer-specific configuration — so you can inspect or vendor it freely with standard Helm tooling:values.yaml template that documents every supported field and indicates which ones are required.Required values
The chart and Traversal Processor together require the following fields. Traversal pre-populates all of them in the values file it builds for you, so you don’t typically need to set them manually:| Field | What it is |
|---|---|
traversalProcessor.account.id | Your account UUID, used to associate ingested logs with your account. |
traversalProcessor.traversalApi.endpoint | The Traversal API endpoint to which the processor sends processed logs. |
traversalProcessor.mtls.certBase64 | Base64-encoded PEM client certificate the processor presents when authenticating to the Traversal API. |
traversalProcessor.mtls.keyBase64 | Base64-encoded PEM private key for the client certificate above. |
Values file
The values file holds your deployment-specific configuration: your account details, Traversal API endpoint, mTLS material, and any deployment-specific tuning or telemetry destinations.Because it may embed private key material, the values file is not published publicly. Instead, Traversal builds it for you and packages it as an OCI artifact in a private Docker Hub namespace, alongside the chart.Receive credentials from Traversal
Through a secure channel, Traversal shares with you a Docker Hub access token, scoped read-only to your deployment’s namespace, and the artifact reference for your values file (for example,
registry-1.docker.io/traversalext/traversal-processor-charts-<your-deployment>:<version>).The Docker Hub username is always traversalext. Only the token is per-customer.Install the ORAS CLI
The values file is published as an OCI artifact, which Helm doesn’t natively pull. Install the ORAS CLI:See the ORAS installation guide for non-macOS platforms.
Installing
With the chart and values file in hand, install in whatever way fits your environment —helm install directly, a GitOps pipeline (ArgoCD, Flux) referencing the OCI chart, or an internal Helm registry mirror. As a minimal end-to-end example using Helm directly:/health on port 3000; its readiness probe gates traffic until the service is ready.Redaction
The processor supports a regex-based redaction pipeline that rewrites sensitive text in log fields before data is sent to Traversal. Redaction is opt-in, disabled by default.Setredaction.enabled in your Helm values and provide a rules file using one of two options:existingConfigMap, the key inside that resource must be named redaction-rules.toml.See Redaction for the rules file format and field filtering options.Want to learn more?
Redaction
Rules file format, field filtering, caching behaviour, and mount examples.
ORAS CLI
Pull OCI artifacts from any registry.
Helm OCI registries
Helm’s native OCI support for chart distribution.