The approach of this project is to provide a tool to analyse logfiles. You can specify rules for the extraction of information from any text files and display and browse them in a swing-based GUI.
SimpleLogViewer is Java 2 based GUI application that display logging data. Can read a file or listen over a TCP socket. Use plugins/embedded scripts to Hide, Rewrite, Colorize lines of log.
Eclipse plugin for filtering logs from serial or ssh connection.
This plugin aims to provide an intuitive way of filtering and sorting logs that are coming from ssh or serial connection.
Operating systems: Windows/Linux
Cross-language and cross-platform user's action tracking framework,enabling researchers to respect user's privacy through visual controls which allow users to start/stop/pause data recording,view logged data and opt out of a research study.
AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
Anicetus is an application telemetry framework. Anicetus defines a language neutral standard for publishing streams of facts about a running application.
The objective of this program is to check log files of your applications. It analyses them and tells you if the application works fine (or not). So that, you just receive one mail to say : "ok", or "some applications seem to go wrong !"
Remote Web Logger is a remote web transaction logging daemon. It operates by passive monitoring of web server traffic to translate web session data to transaction log entries that are written to standard log services such as syslog.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Platform based on JMS queues to centralize System Event Messages (syslog) and Application Layer Messages, persisting them in several Databases and providing several pre- and post- processes according the message's nature, like encryption, mail.