Browse free open source Logging software and projects below. Use the toggles on the left to filter open source Logging software by OS, license, language, programming language, and project status.

  • Enterprise and Small Business CRM Solution | Clear C2 C2CRM Icon
    Enterprise and Small Business CRM Solution | Clear C2 C2CRM

    Voted Best CRM System with Top Ranked Customer Support. CRM Management includes Sales, Marketing, Relationship Management, and Help Desk.

    C2CRM consists of four modules that integrate to provide a comprehensive CRM solution: Relationship Management, Sales Automation, Marketing Automation, and Customer Service. Only buy what each user needs.
  • Holistically view your business data within a single solution. Icon
    Holistically view your business data within a single solution.

    For IT service providers and MSPs that need a data platform to manage their processes

    BrightGauge, a ConnectWise solution, was started in 2011 to fill a missing need in the small-to-medium IT Services industry: a better way to manage data and provide the value of work to clients. BrightGauge Software allows you to display all of your important business metrics in one place through the use of gauges, dashboards, and client reports. Used by more than 1,800 companies worldwide, BrightGauge integrates with popular business solutions on the market, like ConnectWise, Continuum, Webroot, QuickBooks, Datto, IT Glue, Zendesk, Harvest, Smileback, and so many more. Dig deeper into your data by adding, subtracting, multiplying, and dividing one metric against another. BrightGauge automatically computes these formulas for you. Want to show your prospects how quick you are to respond to tickets? Show off your data with embeddable gauges on public sites.
  • 1
    Zabbix

    Zabbix

    Enterprise-class, distributed monitoring solution for networks & apps

    Zabbix is an enterprise-class open source distributed monitoring solution designed to monitor and track performance and availability of network servers, devices and other IT resources. It supports distributed and WEB monitoring, auto-discovery, and more. An enterprise-class distributed monitoring solution for networks & apps
    Leader badge
    Downloads: 244 This Week
    Last Update:
    See Project
  • 2
    BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts coming from a SNORT IDS system.
    Downloads: 30 This Week
    Last Update:
    See Project
  • 3
    Screen Squid

    Screen Squid

    Log analyser for Squid access.log

    Screen squid is web-based interface for viewing reports based on Squid proxy server log files. It can be accessed from web-browser through more than 50 reports. No extra files, only DB. All reports generated "on-the-fly". And we got personal cabinet for each user/group.
    Leader badge
    Downloads: 19 This Week
    Last Update:
    See Project
  • 4

    LogRotateWin

    Implementation of logrotate utility for Windows Platform

    This is a Windows implementation of the logrotate utility found in Linux platforms. The goal is to use the same command line parameters and files as the Linux version. If you are going to give a negative rating, please take a little extra time and explain why. I want to improve the program as much as possible, but I need feedback. Thank you! Source code is available on GitHub: https://github.com/plecos/logrotatewin Now available on Chef Supermarket: https://supermarket.chef.io/cookbooks/windows_logrotate
    Leader badge
    Downloads: 34 This Week
    Last Update:
    See Project
  • Cybersecurity Management Software for MSPs Icon
    Cybersecurity Management Software for MSPs

    Secure your clients from cyber threats.

    Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
  • 5
    THIS PROJECT HAS BEEN ABANDONED SINCE 2007, NO SUPPORT WILL BE PROVIDED. Winpooch is a watchdog for Windows (2000, XP, 2003, but only 32-bits). It detects modifications in your system, so as to detect a trojan or a spyware installation. It also includes a real-time anti-virus. Set your own security level for anti-spyware, ant
    Downloads: 9 This Week
    Last Update:
    See Project
  • 6
    A replacement to traditional syslog daemons. Including cryptographic log protection, mysql, postgresql. Supported on Linux, BSD, Irix, Solaris and AIX.
    Downloads: 5 This Week
    Last Update:
    See Project
  • 7
    A complete OpenSource Network Management System Is SNMP-Standard Oriented (tested on Cisco and Linux). It Integrates Syslog, Tacacs, RRDtool (Performance Graphs), Maps, Traps, TFTP, Autodiscovery, Sound Alerts, AAA, Modular and Extensible.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    LEMA - Log/Event Monitor and Analyser

    LEMA - Log/Event Monitor and Analyser

    Centralized Logging to a database with alerts and powerful RCP-UI

    LEMA is an easy to use Log-Server. It supports asynchronous logging of multiple applications (log4j-appender). The logs are processed and save to a database. An RCP-UI supports Live View, History View with advanced filters. You can use it for Error Monitoring / Notification; in order to do this a rule-based labellng (for instance stacktrace grouping) is performed by the server.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 9
    ArchiveXindex is a fast, lightweight java app that indexes files on CDs, DVDs, removable drives, MP3 players, network shares, etc. Locate files on removable media without access to the physical media. Supports image thumbnails for most popular formats.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Simple, secure, and modern online registration & management system Icon
    Simple, secure, and modern online registration & management system

    Make it easy for your clients to find, register, and pay for classes, camps, and other activities online.

    Jumbula is an end-to-end Online Registration, Payment & Class/Camp Management platform. Designed to streamline day-to-day tasks, we provide our customers with a straightforward administration dashboard and powerful management & marketing tools to promote and sell their after-school programs, camps & classes. Our team strives to offer a modern and intuitive system that is secure, robust, and reliable. Jumbula is constantly developing new features based on the needs shared by our growing community of clients.
  • 10
    Big-Brother is a collection of J2EE filters and servlets that provide custom monitoring and auditing of web-applications, keeping track of who does what, when, and how often. It makes use of the jakarta-apache Struts framework for the interface GUI.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Platform based on JMS queues to centralize System Event Messages (syslog) and Application Layer Messages, persisting them in several Databases and providing several pre- and post- processes according the message's nature, like encryption, mail.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    This program logs all text data you copy in your clipboard into a text file. For what do you need this? Clipboard is a usefull tool, but when it's used too much you can loose your old text with new one. This program logs everything from your clipboard.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Se trata de un Shell Script que detecta un determinado evento en un fichero de log activo y envía notificación vía email.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    The graphical `tail -f`. This is a graphical tool to watch text file as they grow, dynamically.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    A client/server application designed to let the user monitor a directory tree on a remote machine by creating snapshots of current file status in order to later detect file modification, addition and/or removal.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Thanks to this application, customize your files logs in real time with text and colors filters. It is useful if you are a developer for example and if you want to have a good look on your logs in real time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    Labrador is a Host-based Intrusion Detection System (HIDS) and Integrity Checker written entirely in Perl. It aims to be a complete, free, multiplatform, and open-source solution for detecting modifications and tamperings in files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    Logq - (Syslog Query) is a Syslog reader made with perl.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    This simple program watches the syslog's or metalog's log file and pops up the window whenever the new message comes. You can specify the file to watch and a regular expression for parsing the log line, so you can watch other than log files too.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Octopussy: Log Management Solution

    Octopussy: Log Management Solution

    Log Management Solution

    Logs Analyzer, Alerter & Reporter with a Web Interface
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    ProSum is a terminal based program that protects your files, sys_call_table and IDT like tripwire way (All in user space, without kernel modules) In addition, database with files etc. could be encrypted with Blowfish algorythm and more.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22

    ResourcesMonitor

    provides monitoring work of the system distinguishing by applications

    It ensues from vital importance to know the management of the resources that provides the system of a clear way by each application to get essential information for the accomplishment of studies to optimize the available resources of the system. If we do not have the necessary information leads to oversizing of a system using the available resources (computing capacity, storage capacity…). Or conversely applications cannot perform their duties with an adequate performance due to lack of appropriate resources resulting in errors, slowdown… This project develops an application that provides monitoring work of the system distinguishing by applications, allowing the user to interact dynamically with the interface, displaying the information in a simple, graphic and accurate way. The developed application integrates perfectly in the Microsoft environment using available tools to extract data of the system in an optimal way.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    SquidRH is a utility to convert squid log files to a database (like MySQL or PostgreSQL) and then generate statistic pages in real-time. This consumes much less the necessary than querying a squid log file, which sometimes gets very big.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    It�s a program to monitor applications running on a workstation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Templario is a security event audit and compliance suite which helps you to monitor enterprise security from one central console. Templario automates and consolidates complicated enterprise network security auditing and requires near-zero administration.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • Next