<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Project Jupiter]]></title><description><![CDATA[Project Jupiter]]></description><link>https://blog.projectjupiter.in</link><image><url>https://cdn.hashnode.com/res/hashnode/image/upload/v1758015066067/babd3e6e-ad9c-44f7-ac4a-34d43960a68b.png</url><title>Project Jupiter</title><link>https://blog.projectjupiter.in</link></image><generator>RSS for Node</generator><lastBuildDate>Tue, 19 May 2026 01:23:25 GMT</lastBuildDate><atom:link href="https://blog.projectjupiter.in/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[Phase 0: Mapping the Landscape – What Existing SIEMs Teach and What They Miss]]></title><description><![CDATA[Before I built anything for Project Jupiter, I wanted to understand the space I was stepping into. There are many SIEM and SOAR tools already available. Some are open source, some are enterprise heavyweights, and almost all of them promise complete v...]]></description><link>https://blog.projectjupiter.in/phase-0-mapping-the-landscape-what-existing-siems-teach-and-what-they-miss</link><guid isPermaLink="true">https://blog.projectjupiter.in/phase-0-mapping-the-landscape-what-existing-siems-teach-and-what-they-miss</guid><category><![CDATA[SIEM]]></category><category><![CDATA[Security]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[AI]]></category><category><![CDATA[information security]]></category><category><![CDATA[monitoring]]></category><dc:creator><![CDATA[Sai Harsha Vardhan]]></dc:creator><pubDate>Mon, 08 Dec 2025 20:56:50 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/stock/unsplash/3v5NGrGONiY/upload/47cfc2202eb6f2261d149d135eebc701.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>Before I built anything for Project Jupiter, I wanted to understand the space I was stepping into. There are many SIEM and SOAR tools already available. Some are open source, some are enterprise heavyweights, and almost all of them promise complete visibility and security.<br />So the first real question I asked myself was simple. If all these tools already exist, why do analysts still struggle with noise, complexity and cost?</p>
<p>That question shaped the second step of Phase 0.</p>
<hr />
<h2 id="heading-what-i-looked-at">What I Looked At</h2>
<p>My research fell into three groups.</p>
<h3 id="heading-open-source-and-community-platforms">Open Source and Community Platforms</h3>
<p>I examined tools like Wazuh, Security Onion and the ELK stack.<br />Each had strengths, but each also had gaps. Some were powerful but heavy. Some flexible but incomplete. Some were simple but lacked depth.<br />Still, every one of them contributed something to my understanding.</p>
<h3 id="heading-enterprise-ecosystems-and-real-operations">Enterprise Ecosystems and Real Operations</h3>
<p>A major part of my learning came from my time at ATOS, where I worked around their internal SIEM ecosystem. I will not describe anything about the platform itself, but the environment around it taught me a lot.</p>
<p>I worked with architecture teams, implementation teams, SOC analysts, threat hunters, production support, big data teams, log onboarding specialists and UI and UX groups.<br />Seeing how these teams interact in real incidents gave me a strong picture of what enterprise scale looks like and what a SIEM must handle every day.</p>
<p>It showed me that a SIEM is not a single tool. It is a living ecosystem that touches almost everything.</p>
<h3 id="heading-industry-standards-and-frameworks">Industry Standards and Frameworks</h3>
<p>I also studied frameworks like OCSF, MITRE ATT&amp;CK and more.<br />They helped me understand what a modern security platform should align with in terms of structure, events and behavior.</p>
<hr />
<h2 id="heading-what-existing-tools-do-well">What Existing Tools Do Well</h2>
<p>Despite their problems, there are many things SIEMs get right.</p>
<h3 id="heading-parsing-and-normalization">Parsing and Normalization</h3>
<p>Most mature tools handle logs from many different sources with impressive consistency.</p>
<h3 id="heading-data-handling-at-scale">Data Handling at Scale</h3>
<p>Enterprise SIEMs are designed to handle huge data volumes while keeping correlation and indexing reliable.</p>
<h3 id="heading-interfaces-and-dashboards">Interfaces and Dashboards</h3>
<p>Years of iteration and feedback cycles have given these tools polished dashboards, search views and timelines.</p>
<h3 id="heading-governance-and-compliance">Governance and Compliance</h3>
<p>Audit views, long term storage, access control and reporting are usually solid and reliable.</p>
<p>These strengths formed the baseline of what Jupiter should eventually grow into.</p>
<hr />
<h2 id="heading-where-they-struggle">Where They Struggle</h2>
<p>Even with their strengths, SIEMs share a number of common challenges.</p>
<h3 id="heading-cost">Cost</h3>
<p>Most SIEM platforms are extremely expensive. Even the open source ones become costly once data volume grows.</p>
<h3 id="heading-vendor-dependence">Vendor Dependence</h3>
<p>Many tools tie you into a specific cloud or ecosystem. Flexibility becomes limited.</p>
<h3 id="heading-complexity">Complexity</h3>
<p>Running a SIEM often requires several teams. Tuning rules, managing infrastructure, keeping ingestion healthy and handling noise all require constant work.</p>
<h3 id="heading-ai-that-does-not-truly-help">AI That Does Not Truly Help</h3>
<p>Many tools advertise AI features, but most of them do not fundamentally improve triage or analysis. They act more like separate tools, not integrated intelligence.</p>
<h3 id="heading-limited-self-hosted-options">Limited Self-Hosted Options</h3>
<p>There are very few tools that can be installed and used fully on a local machine or home lab. Most require cloud infrastructure or heavy dependencies.</p>
<p>These gaps became the reasons Jupiter should exist at all.</p>
<hr />
<h2 id="heading-what-this-research-taught-me">What This Research Taught Me</h2>
<p>Looking at all these tools helped me identify the principles that guide Jupiter.</p>
<h3 id="heading-it-should-run-anywhere">It should run anywhere</h3>
<p>Laptop, old hardware, enterprise server, cloud VM or anything in between. The tool should adapt to the environment.</p>
<h3 id="heading-it-should-be-modular">It should be modular</h3>
<p>Users should enable or disable components according to their needs. Not everyone requires everything.</p>
<h3 id="heading-ocsf-from-day-one">OCSF from day one</h3>
<p>One schema for all data makes everything more understandable and more future proof.</p>
<h3 id="heading-ai-should-be-integrated-correctly">AI should be integrated correctly</h3>
<p>AI should help interpret events, not become another noisy feature.<br />Local inference when possible, API fallback when needed.</p>
<h3 id="heading-it-should-be-friendly-to-solo-developers-and-small-teams">It should be friendly to solo developers and small teams</h3>
<p>People should be able to experiment without requiring a dedicated engineering team.</p>
<p>These ideas now act as the foundation for Jupiter’s architecture.</p>
<hr />
<h2 id="heading-personal-reflections">Personal Reflections</h2>
<h3 id="heading-what-surprised-me">What surprised me</h3>
<p>Most SIEM tools are far more similar internally than they appear from the outside. The differences tend to be polish, performance and scale, not the underlying logic.</p>
<h3 id="heading-what-changed-my-mind">What changed my mind</h3>
<p>I initially believed that removing features made a system simpler. I later realized that clarity is what makes a system simple.<br />Users need to understand why the system produces an alert or a view, not just what it shows.</p>
<hr />
<h2 id="heading-what-comes-next"><em>What Comes Next</em></h2>
<p><em>The next article in Phase 0 will explore Jupiter’s architecture itself. It will focus on how all these lessons shaped the first structural decisions and why each component exists.</em></p>
]]></content:encoded></item><item><title><![CDATA[Phase 0 - Laying the Blueprint: How Project Jupiter Begins to Take Shape]]></title><description><![CDATA[Every complex system starts with a question, not a commit.


Why This Phase Exists
Phase 0 of Project Jupiter is where everything slowed down on purpose.Before writing production code, I wanted to understand how far a single person could go in buildi...]]></description><link>https://blog.projectjupiter.in/phase-0-laying-the-blueprint-how-project-jupiter-begins-to-take-shape</link><guid isPermaLink="true">https://blog.projectjupiter.in/phase-0-laying-the-blueprint-how-project-jupiter-begins-to-take-shape</guid><category><![CDATA[cybersecurity]]></category><category><![CDATA[AI]]></category><category><![CDATA[SIEM]]></category><category><![CDATA[Security]]></category><category><![CDATA[technology]]></category><category><![CDATA[Computer Science]]></category><dc:creator><![CDATA[Sai Harsha Vardhan]]></dc:creator><pubDate>Tue, 28 Oct 2025 19:32:13 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/stock/unsplash/0g-iLtxmMhA/upload/dedfb0885d111ed0fa06048f46e2bf27.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<blockquote>
<p><em>Every complex system starts with a question, not a commit.</em></p>
</blockquote>
<hr />
<h2 id="heading-why-this-phase-exists">Why This Phase Exists</h2>
<p>Phase 0 of <strong>Project Jupiter</strong> is where everything slowed down on purpose.<br />Before writing production code, I wanted to understand <strong>how far a single person could go</strong> in building a self-hosted, AI-assisted security and monitoring platform one that could run anywhere, without depending on a single cloud, vendor, or budget.</p>
<p>This phase is less about configuration and more about <strong>philosophy, research, and structure</strong>.<br />It’s where ideas harden into architecture.</p>
<hr />
<h2 id="heading-what-i-set-out-to-learn">What I Set Out to Learn</h2>
<p>When I began blueprinting, I had a few key questions written in my notebook:</p>
<ul>
<li><p>Could one developer realistically design a <strong>vendor-neutral, OCSF-native SIEM</strong>?</p>
</li>
<li><p>How can AI actually <em>reduce</em> noise instead of creating more of it?</p>
</li>
<li><p>How do you stay flexible enough to work on-prem, in the cloud, or in a hybrid mesh without building parallel systems?</p>
</li>
</ul>
<p>These questions became my compass.</p>
<hr />
<h2 id="heading-lessons-from-the-field">Lessons from the Field</h2>
<p>My background helped frame these questions.<br />Having worked in product support and later as a threat hunter, I saw both ends of the spectrum from the chaos of customer logs to the calm dashboards of analysts.<br />I learned that every SIEM pipeline eventually wrestles with the same three beasts: <strong>data volume, normalization, and fatigue</strong>.</p>
<hr />
<h2 id="heading-the-first-conviction">The First Conviction</h2>
<p>Very early, I made a decision that still defines the project:</p>
<blockquote>
<p><strong>Jupiter must run anywhere.</strong></p>
</blockquote>
<p>It shouldn’t matter whether it’s a GPU workstation, a cloud VM, or an old laptop in someone’s lab.<br />This principle shaped every later choice from storage (DuckDB) to orchestration (NiFi) to how AI inference could fall back to API calls when GPU resources aren’t available.</p>
<hr />
<h2 id="heading-the-early-architecture">The Early Architecture</h2>
<p>At this stage, the design looked simple on paper but ambitious in intent.</p>
<p><img src="https://cdn.hashnode.com/res/hashnode/image/upload/v1761679400730/3ac94774-97cc-42b3-8252-f3895a1a7e8d.jpeg" alt class="image--center mx-auto" /></p>
<p>This was the first time I saw how all parts might speak the same language, data flowing in OCSF format, AI models helping to summarize and correlate, and dashboards surfacing clarity instead of chaos.</p>
<p><em>Since this is still in active planning and development, services and technologies might change.</em></p>
<hr />
<h2 id="heading-what-changed-my-mind">What Changed My Mind</h2>
<p>Originally, I believed I could keep everything local, run the AI fully on-prem.<br />That lasted until I tried inference without a GPU.<br />Now, Jupiter supports both: local inference for those with hardware, and <strong>API-based fallback</strong> for community setups.<br />Scalability starts with empathy for different users.</p>
<hr />
<h2 id="heading-whats-next">What’s Next</h2>
<p>Phase 0 continues with documenting the research behind this blueprint, exploring how existing SIEM tools work, what they miss, and why Jupiter’s hybrid model matters.</p>
<p>The next article:<br /><strong>“Mapping the Landscape - What Existing SIEMs Teach (and Miss)”</strong></p>
<p>Stay tuned, and if you’ve built or broken your own SIEM before, I’d love to hear what <em>you</em> learned.</p>
]]></content:encoded></item><item><title><![CDATA[Project Jupiter Explained: Developing a Self-Hosted Security and Monitoring Platform]]></title><description><![CDATA[Why "Jupiter"?
I named this project Jupiter for two reasons:

Just like the planet Jupiter, which is massive and protective in our solar system, I want this platform to act as a shield — absorbing threats before they can do damage.

The name also ref...]]></description><link>https://blog.projectjupiter.in/project-jupiter-explained-developing-a-self-hosted-security-and-monitoring-platform</link><guid isPermaLink="true">https://blog.projectjupiter.in/project-jupiter-explained-developing-a-self-hosted-security-and-monitoring-platform</guid><category><![CDATA[#cybersecurity]]></category><category><![CDATA[Security]]></category><category><![CDATA[AI]]></category><category><![CDATA[#ai-tools]]></category><category><![CDATA[information security]]></category><category><![CDATA[SIEM]]></category><dc:creator><![CDATA[Sai Harsha Vardhan]]></dc:creator><pubDate>Tue, 16 Sep 2025 09:36:19 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/stock/unsplash/awYEQyYdHVE/upload/ca3f71fccd43fde65d124b5274883cd4.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<h2 id="heading-why-jupiter">Why "Jupiter"?</h2>
<p>I named this project <strong>Jupiter</strong> for two reasons:</p>
<ul>
<li><p>Just like the planet Jupiter, which is massive and protective in our solar system, I want this platform to act as a shield — absorbing threats before they can do damage.</p>
</li>
<li><p>The name also reflects scale. A platform that starts small in my hands but has the potential to grow into something vast, resilient, and future-ready.</p>
</li>
</ul>
<hr />
<h2 id="heading-the-spark">The Spark</h2>
<p>Most cybersecurity tools today live at two extremes:</p>
<ul>
<li><p><strong>Enterprise platforms</strong> — powerful but noisy, expensive, and often locked to a single vendor.</p>
</li>
<li><p><strong>Open-source tools</strong> — flexible but fragmented, difficult to set up, and not always future-proof.</p>
</li>
</ul>
<p>I wanted to explore whether one person, with consumer-grade hardware, could build something different:<br />a <strong>self-hosted, privacy-first, AI-assisted security and monitoring platform</strong>.</p>
<hr />
<h2 id="heading-the-vision">The Vision</h2>
<p>Project Jupiter is designed to be:</p>
<ul>
<li><p><strong>Learning-first</strong> → a journey of exploration and improvement.</p>
</li>
<li><p><strong>Privacy-first</strong> → all data remains under user control.</p>
</li>
<li><p><strong>Environment-agnostic</strong> → deployable on a laptop, server, cloud, or hybrid setup.</p>
</li>
<li><p><strong>AI-assisted</strong> → using machine learning to reduce noise, spot anomalies, and accelerate response.</p>
</li>
<li><p><strong>Future-proof</strong> → aligned with open standards like <strong>OCSF (Open Cybersecurity Schema Framework)</strong>.</p>
</li>
</ul>
<hr />
<h2 id="heading-the-problems-im-tackling">The Problems I’m Tackling</h2>
<ul>
<li><p><strong>Alert fatigue</strong> → endless false positives overwhelm analysts.</p>
</li>
<li><p><strong>Vendor lock-in</strong> → once you commit, it’s hard to leave.</p>
</li>
<li><p><strong>Scaling costs</strong> → every log line becomes a billing problem.</p>
</li>
<li><p><strong>Fragmentation</strong> → IT, OT, and physical security data live in silos.</p>
</li>
</ul>
<hr />
<h2 id="heading-the-roadmap">The Roadmap</h2>
<p>The build is split into clear phases:</p>
<ol>
<li><p><strong>Foundation</strong> → define scope, principles, and risks.</p>
</li>
<li><p><strong>Core Infrastructure</strong> → flows, caching, and observability.</p>
</li>
<li><p><strong>Ingestion &amp; Normalization</strong> → parse events, map to OCSF, store efficiently.</p>
</li>
<li><p><strong>Intelligence &amp; Automation</strong> → threat intelligence, AI summaries, automated playbooks.</p>
</li>
<li><p><strong>UX &amp; Dashboards</strong> → tenant dashboards, reporting, chatbot copilot.</p>
</li>
<li><p><strong>Ops &amp; Recovery</strong> → backups, restore drills, resilience testing.</p>
</li>
</ol>
<hr />
<h2 id="heading-why-share-this">Why Share This?</h2>
<p>Because cybersecurity shouldn’t be a black box.<br />By sharing Project Jupiter openly, I hope to:</p>
<ul>
<li><p>Inspire students and hobbyists who want to learn hands-on security.</p>
</li>
<li><p>Explore how AI can make monitoring smarter and less noisy.</p>
</li>
<li><p>Show that meaningful tools don’t always need enterprise budgets.</p>
</li>
</ul>
<hr />
<h2 id="heading-whats-next">What’s Next</h2>
<p>This is just the prologue.<br />In the next article, I’ll dive into <strong>Phase 0: the blueprinting stage</strong> — the research, risks, and first design choices.</p>
<p>Follow along here on Hashnode as I document the journey 🚀</p>
]]></content:encoded></item></channel></rss>