Showing 13 open source projects for "log"

View related business solutions
  • Vibes don’t ship, Retool does Icon
    Vibes don’t ship, Retool does

    Start from a prompt and build production-ready apps on your data—with security, permissions, and compliance built in.

    Vibe coding tools create cool demos, but Retool helps you build software your company can actually use. Generate internal apps that connect directly to your data—deployed in your cloud with enterprise security from day one. Build dashboards, admin panels, and workflows with granular permissions already in place. Stop prototyping and ship on a platform that actually passes security review.
    Build apps that ship
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • 1
    UTMStack

    UTMStack

    Customizable SIEM and XDR powered by Real-Time correlation

    ...UTMStack is a unified threat management platform that merges SIEM (Security Information and Event Management) and XDR (Extended Detection and Response) technologies. Our unique approach allows real-time correlation of log data, threat intelligence, and malware activity patterns from multiple sources, enabling the identification and halting of complex threats that use stealthy techniques. UTMStack stands out in threat prevention by surpassing the boundaries of traditional systems. Our software platform can swiftly analyze log data to identify and halt threats at their source in real-time, even if the threat was not directly detected on the server itself. ...
    Downloads: 7 This Week
    Last Update:
    See Project
  • 2
    l'oGGo

    l'oGGo

    A powerful terminal app for structured log streaming

    l'oGGo or Log & Go is a rich Terminal User Interface app written in Golang that harnesses the power of your terminal to digest log streams based on JSON-based logs. This can be used against applications running locally, on a Kubernetes cluster (see K8S Cheatsheet), GCP Stack Driver (Google Logs, see GCP-Stream Command), and many others.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Flog

    Flog

    A fake log generator for common log formats

    flog is a fake log generator built in Go that produces realistic log entries in several common formats, including Apache common, Apache combined, Apache error, RFC3164, RFC5424, and JSON. It was created to help developers and operators test systems that consume log data, such as log pipelines, SIEMs, or streaming platforms like Amazon Kinesis. Users can control the output by specifying the log format, output file path, log type (stdout, plain log file, or gzip-compressed file), and either the number of lines or the total byte size of logs to generate. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Grafana Mimir

    Grafana Mimir

    Grafana Mimir provides long-term storage for Prometheus

    Grafana Mimir is an open-source, horizontally scalable, long-term storage solution for Prometheus metrics. Built by Grafana Labs, Mimir is designed to handle massive volumes of time-series data efficiently while maintaining high availability and reliability. It enables organizations to scale their Prometheus infrastructure without the typical limitations of single-server setups. Mimir is used to power Grafana Cloud Metrics and is built to be fully compatible with Prometheus, allowing easy...
    Downloads: 4 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 5
    docker-gen

    docker-gen

    Generate files from docker container meta-data

    docker-gen is a file generator that renders templates using docker container meta-data. Centralized logging - fluentd, logstash or other centralized logging tools that tail the containers JSON log file or files within the container. Log Rotation - logrotate files to rotate container JSON log files. Reverse Proxy Configs - nginx, haproxy, etc. reverse proxy configs to route requests from the host to containers. Service Discovery - Scripts (python, bash, etc..) to register containers within etcd, hipache, etc. Docker-gen can be bundled inside of a container along-side applications. nginx-proxy/nginx-proxy trusted build is an example of running docker-gen within a container along-side nginx. jwilder/docker-register is an example of running docker-gen within a container to do service registration with etcd.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    DTail

    DTail

    DTail is a distributed DevOps tool for tailing, grepping, catting logs

    DTail (a distributed tail program) is a DevOps tool for engineers programmed in Google Go for following (tailing), catting and grepping (including gzip and zstd decompression support) log files on many machines concurrently. An advanced feature of DTail is to execute distributed MapReduce aggregations across many devices. For secure authorization and transport encryption, the SSH protocol is used. Furthermore, DTail respects the UNIX file system permission model (traditional on all Linux/UNIX variants and also ACLs on Linux based operating systems). ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    OAuth2 Proxy

    OAuth2 Proxy

    A reverse proxy that provides authentication with Google, Azure, etc.

    A reverse proxy and static file server that provides authentication using Providers (Google, GitHub, and others) to validate accounts by email, domain or group. If you are running a version older than v6.0.0 we strongly recommend you please update to the current version. After returning from the authentication provider, the OAuth tokens are stored in the configured session store (cookie, redis, ...) and a cookie is set. The request is forwarded to the upstream server with added user info and...
    Downloads: 25 This Week
    Last Update:
    See Project
  • 8
    NextDNS

    NextDNS

    NextDNS CLI client (DoH Proxy)

    NextDNS protects you from all kinds of security threats, blocks ads and trackers on websites and in apps and provides a safe and supervised Internet for kids, on all devices and on all networks. Determine your threat model and fine-tune your security strategy by enabling 10+ different types of protections. Use the most trusted threat intelligence feeds containing millions of malicious domains, all updated in real-time. Go beyond the domain, we analyze DNS questions and answers on-the-fly (in...
    Downloads: 12 This Week
    Last Update:
    See Project
  • 9
    GoatCounter

    GoatCounter

    Easy web analytics. No tracking of personal data

    GoatCounter is an open-source web analytics platform available as a hosted service (free for non-commercial use) or self-hosted app. It aims to offer easy-to-use and meaningful privacy-friendly web analytics as an alternative to Google Analytics or Matomo. Privacy-aware; doesn’t track users with unique identifiers and doesn't need a GDPR notice. Fine-grained control over which data is collected. Also see the privacy policy and GDPR consent notices. Lightweight and fast; adds just ~3.5KB of...
    Downloads: 1 This Week
    Last Update:
    See Project
  • The complete IT asset and license management platform Icon
    The complete IT asset and license management platform

    Gain full visibility and control over your IT assets, licenses, usage and spend in one place with Setyl.

    The platform seamlessly integrates with 100+ IT systems, including MDM, RMM, IDP, SSO, HR, finance, helpdesk tools, and more.
    Learn More
  • 10
    Fluent Bit Plugin for CloudWatch Logs

    Fluent Bit Plugin for CloudWatch Logs

    A Fluent Bit output plugin for CloudWatch Logs

    ...The plugin can also retrieve credentials from a shared credentials file, or from the standard AWS_ACCESS_KEY_ID, AWS_SECRET_ACCESS_KEY, AWS_SESSION_TOKEN environment variables. A template in the form of $(variable) can be set in log_group_name or log_stream_name. variable can be a map key name in the log message. To access sub-values in the map use the form $(variable['subkey']). Also, it can be replaced with special values to insert the tag, ECS metadata, or a random string in the name. It can achieve higher throughput and will consume less CPU and memory.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Amazon Elastic Container Service RPM

    Amazon Elastic Container Service RPM

    Amazon Elastic Container Service RPM

    ...The upstart script installed by the Amazon ECS RPM runs at the completion of runlevel 3, 4, or 5 as the system starts. The script will clean up any previous copies of the Amazon ECS Container Agent, and then start a new copy. Logs from the RPM are available at /var/log/ecs/ecs-init.log, while logs from the Amazon ECS Container Agent are available at /var/log/ecs/ecs-agent.log. The Amazon ECS RPM makes the Amazon ECS Container Agent introspection endpoint available at http://127.0.0.1:51678/v1. Configuration for the Amazon ECS Container Agent is read from /etc/ecs/ecs.config. All of the configurations in this file are used as environment variables of the ECS Agent container. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    armor

    armor

    Uncomplicated, modern HTTP server

    ...Automatically install TLS certificates from https://letsencrypt.org. Proxy HTTP and WebSocket requests. Define virtual hosts with path level routing. Graceful shutdown. Limit request body. Serve static files. Log requests. Gzip response. Cross-origin Resource Sharing (CORS). Security, XSSProtection. ContentTypeNosniff. ContentSecurityPolicy. HTTP Strict Transport Security (HSTS). Add/Remove trailing slash from the URL with the option to redirect.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Jocko

    Jocko

    Kafka implemented in Golang with built-in coordination

    Kafka/distributed commit log service in Go. Protocol compatible with Kafka so Kafka clients and services work with Jocko. Use Serf for discovery, Raft for consensus (and remove the need to run ZooKeeper). Able to use percentages of disk space for retention policies rather than only bytes and time kept. Handling size configs when you change the number of partitions or add topics.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next