Showing 5 open source projects for "log library"

View related business solutions
  • Total Network Visibility for Network Engineers and IT Managers Icon
    Total Network Visibility for Network Engineers and IT Managers

    Network monitoring and troubleshooting is hard. TotalView makes it easy.

    This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
  • Simplify Purchasing For Your Business Icon
    Simplify Purchasing For Your Business

    Manage what you buy and how you buy it with Order.co, so you have control over your time and money spent.

    Simplify every aspect of buying for your business in Order.co. From sourcing products to scaling purchasing across locations to automating your AP and approvals workstreams, Order.co is the platform of choice for growing businesses.
  • 1
    AlienVault OSSIM

    AlienVault OSSIM

    Open Source SIEM

    OSSIM, AlienVault’s Open Source Security Information and Event Management (SIEM) product, provides event collection, normalization and correlation. For more advanced functionality, AlienVault Unified Security Management (USM) builds on OSSIM with these additional capabilities: * Log management * Advanced threat detection with a continuously updated library of pre-built correlation rules * Actionable threat intelligence updates from AlienVault Labs Security Research Team * Rich analytics...
    Leader badge
    Downloads: 60 This Week
    Last Update:
    See Project
  • 2

    Bedtime

    Disconnect your children from the Internet after bedtime.

    Bedtime controls the bedtime of your children by automatically disconnecting their devices from your Internet connection. It does this by replacing your ISP router as the source of IP addresses, which allows it to learn all the devices on your network and control their access. Parents can log into a web interface, link devices to children and set their bedtimes for school nights and weekends. Misbehaving children can be grounded or children's access can be extended as a reward.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Whale is a project that does pre-filtering for logfiles created by the squid proxy server. The accesslog creates by squid will be put in a SQL databases (currfently PostgreSQL). After that a usercan filter out data you don\'t need and call other progra
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    IP traffic accounting on CISCO routers.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gain insights and build data-powered applications Icon
    Gain insights and build data-powered applications

    Your unified business intelligence platform. Self-service. Governed. Embedded.

    Chat with your business data with Looker. More than just a modern business intelligence platform, you can turn to Looker for self-service or governed BI, build your own custom applications with trusted metrics, or even bring Looker modeling to your existing BI environment.
  • 5
    FAST library for storing and displaying various types of statistics. Rock stable and robust and well-designed image output.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next