Graylog vs Splunk

Graylog is ranked 6th in Log Management with 7 reviews vs Splunk which is ranked 1st in Log Management with 46 reviews. The top reviewer of Graylog writes "Provides the ability to write custom alerts, which are key to information security and compliance". The top reviewer of Splunk writes "Monitors all machine logins and actions taken on those machines under each user". Graylog is most compared with ELK Logstash, Splunk and AlienVault. Splunk is most compared with IBM QRadar, LogRhythm and ArcSight. See our Graylog vs Splunk report.
Cancel
You must select at least 2 products to compare!
+Add products to compare
28999
31711
18468
Most Helpful Review
Find out what your peers are saying about Graylog vs Splunk and others in Log Management.
287,566 professionals have used our research since 2012.

Quotes From Members Comparing Graylog vs Splunk

We asked business professionals to review the solutions they use. Here are some excerpts of what they said:
Pros
Log-monitoring and alerting enable us to know when things happen that we need to know about.The dashboards are very descriptive and contain just the right amount of information. The activity alarms and events contain a plethora of data that is very descriptive and useful.AlienVault provides a checklist answer when using SIEM.I can easily check (in one place) all the logs and data in relation to attacks. It also gives me an overview if a server is not configured properly.Its powerful correlation engine helps reduce time in manually correlating events.The main menu: You can see everything there, what is happening on the servers, and in the logs, you can view more details of each event.It has allowed us to see what is happening on our servers.The Event Correlation and vulnerability scans have been the most useful. As a 24/7 SOC, we use the incoming alarms to give an overview of suspicious traffic going through the network. It's easy to look at the correlated events and see the broad picture of traffic for that customer. Vulnerability scans are good for providing patch and remediation guidelines to keep customer systems secure.

Read more »

Real-time UDP/GELF logging and full text-based searching.UDP is a fast and lightweight protocol, perfect for sending large volumes of logs with minimal overhead.Storing logs in Elasticsearch means log retrieval is extremely fast, and full text search is available by default.We run a containerized microservices environment. Being able to set up streams and search for errors and anomalies across hundreds of containers is why a log aggregation platform like Graylog is valuable to us.Allowing us to set up alerts and integrate with platforms we already use, such as Slack and OpsGenie to alert users of these errors proactively, is also a very useful feature.It is used as a log manager/SIEM. It provides visibility into the infrastructure and security related events.The build is stable and requires little maintenance, even compared to some extremely expensive products.We have scaled from a single machine installation (a VM with a Graylog + ES + MongoDB) to (2 Graylog + 2 ES + 3 MongoDB). This was done smoothly with a minimal impact on logging.

Read more »

It is a one stop shop as a full monitoring and alerting solution for operations and application analysis for most of our back-end systems.We used it to create a custom anomaly detection data model to monitor the activity of our back-end services on an hourly basis relative to the past three months of activity.Splunk UBA is useful for fraud detection and for detection of APTs, advanced persistent threats.UBA, User Behavior Analytics, is a key feature.We can ingest and correlate data from virtually any type of system.Capability to expand the functionality through custom code for data inputs, commands, visualization, alerts, and machine learning.Splunk has significantly helped with aggregation and correlation of critical logs. Not having to grep on each individual server has made everyone more efficient.Splunk has facilitated the correlation of information security logs to look for incidents which could cause damage to the company's infrastructure, as well as financial losses from leaks.

Read more »

Cons
they seem to have bugs from time to time that go unfixed for a while and that is frustrating. I'm not saying the product needs to be bug-free, but they need to be responsive to bugs.The only room for improvement I can mention is the initial installation procedures. I found that the online installation instructions for the product were missing important details, they lacked necessary steps.We develop additional rules and scripts to make it more usable.Plugins could be better utilized, as some of them do not recognize all logs.It was easy on PoC, but when we got to the product it was different story. We had to learn the product again and got feeling that the PoC was a different product.The only complex area of the setup was writing the custom scripts.It should be able to communicate with other security solutions to stop threats.As this software is in the cloud, you do not have control on updates and general changes which are happening.

Read more »

More complex visualizations and the ability to execute custom Elasticsearch queries would be great.With technical support, you are on your own without an enterprise license.Elasticsearch recommendations for tuning could be better. Graylog doesn't have direct support for running the system inside of Kubernetes, so it can be challenging to fill in the gaps and set up containers in a way that is both performant and stable.We ran into problems with Elasticsearch throwing a circuit-breaking exception due to field data size being too large. It turned out that the heap size directly impacted this size in a high-throughput environment, causing unexplained instability in Graylog. We were able to troubleshoot on the Elasticsearch size, but we should have been able to reference some minimum requirements for Graylog to know that our settings weren't sufficient.Since container orchestration systems are popular and Graylog fits the niche well, perhaps they could officially support running in docker containers on Kubernetes as a StatefulSet as a use case. That way, the declarative nature of Kubernetes config files would document their best case deployment scenario-Dashboards, stream alerts and parsing could be improved.Over six months, I had two similar issues where searches were performed on field "messages". It exhausted all the memory of the ES node causing an ES crash and a Graylog halt.There should be some user groups and an auto sign-in feature.​

Read more »

It needs to improve the way to install third-party apps and enable installation without logging into splunk.com.I think the machine learning should be emphasized. Now, it's really important to analyze Big Data, data mining. A SIEM solution, like Splunk, needs an improved data mining solution, artificial intelligence.Missing capability for audio/video and image processing.While scheduled reports can be embedded, Splunk dashboard can not be embedded directly without enabling cross origin.DMC should be a little more intuitive with better dashboarding. Seeing the cause of data flow can be tough to track down.Splunk can improve regex/asset analysis as we do not want to crawl until it is done.It can be tough to get a hold of somebody in technical support depending on the complexity of the issue.The Enterprise Security app could be improved. We have had trouble with it working from the first day.

Read more »

Pricing and Cost Advice
I don't think the product's pricing is a good value because they try to raise the price 50 percent every year... AlienVault needs to understand that not all customers are huge enterprises... Their sales team is way too aggressive. The price they advertise is not always the price you get.So far, I feel the product's pricing is a good value. The technology is decent. You get what you pay for. I think it's fair.​The vulnerability management solution is worse than buying a Nessus Professional license.​The ROI is quite good.Use an MSSP instead. It is much cheaper.We ran a few PoCs. The price and feature set were the best with AlienVault.Negotiate the best package for your environment.It has good pricing.

Read more »

​You get a lot out-of-the-box with the non-enterprise version, so give it a try first.Consider Enterprise support if you have atypical needs or setup requirements.​If you want something that works and do not have the money for Splunk or QRadar, take Graylog.​​I am using a community edition. I have not looked at the enterprise offering from Graylog.Having paid official support is wise for projects.

Read more »

It is possible to use a developer's license, which is up to 10GB per day of volume traffic, which is usually enough for most use cases.Free Splunk license for PoCs on personal machines and the ability to scale the PoC to an enterprise level app.It can be expensive, especially the licensing costs. However, there is added value in what it can do, not just log aggregation.Splunk is a bit pricier, but the benefits and ROI are huge.It is a pretty high cost solution, but if your organization has the funds, it can bring many benefits.Personnel costs are saved by not having to involve the domain developers from multiple teams when tracing a problem that spans multiple platforms.Truly evaluate the data you want to ingest and go slow. Pulling in data that can provide no use to your mission only wastes data against your license.Our ROI is high.

Read more »

report
Use our free recommendation engine to learn which Log Management solutions are best for your needs.
287,566 professionals have used our research since 2012.
Top Comparisons
Top Comparisons
Compared 33% of the time.
Compared 17% of the time.
Compared 11% of the time.
See more AlienVault competitors »
Compared 52% of the time.
Compared 26% of the time.
Compared 7% of the time.
See more Graylog competitors »
Compared 19% of the time.
Compared 14% of the time.
Compared 8% of the time.
Also Known As
Also Known AsAlienVault Unified Security ManagementGraylog2
Website/Video
Website/VideoAlienVault
Graylog
Splunk
Overview
Overview

Unified Security Management (USM) is AlienVault’s comprehensive approach to security monitoring, delivered in a unified platform. The USM platform includes five core security capabilities that provide resource-constrained organizations with all the security essentials needed for effective threat detection, incident response, and compliance, in a single pane of glass. Designed to monitor cloud, hybrid cloud and on-premises environments, AlienVault USM significantly reduces complexity and reduces deployment time so that users can go from installation to first insight in minutes for the fastest threat detection.

The vendor says unlike traditional security point technologies, AlienVault Unified Security Management does the following:

o   Unifies essential security controls into a single all-in-one security monitoring solution

o   Monitors your cloud, hybrid cloud, and on-premises infrastructure

o   Delivers continuous threat intelligence to keep you aware of threats as they emerge and change

o   Provides comprehensive threat detection and actionable incident response directives

o   Deploys quickly, easily, and with minimal effort

o   Reduces TCO over traditional security solutions

Splunk software has been around since 2006 and the company has since grown to become an industry leader. Splunk's vision is to make machine data accessible, usable and valuable to everybody. The company offers a wide range of products to turn machine data into valuable information by monitoring and analyzing all activities. This is known as Operational Intelligence and is the unique value proposition of Splunk.

Splunk is well-known for its Log Management capabilities and also for its Security Information and Event Management (SIEM) solutions.

OFFER
Learn more about AlienVault
Learn more about Graylog
Learn more about Splunk
Sample Customers
Sample CustomersAbel & Cole, Bank of Ireland, Bluegrass Cellular, CareerBuilder, Claire's, Domino's, GameStop, Hays Medical Center, Hope International, McCurrach, McKinsey & Company, Party Delights, Pepco Holdings, Richland School District, Ricoh, SaveMart, Shake Shack, Steelcase, Subaru, TaxAct, US Air Force, Vonage, ZioskBlue Cross Blue Shield, eBay, Cisco, LinkedIn, SAP, King.com, Twilio, Deutsche Presse-AgenturSplunk has more than 7,000 customers spread across over 90 countries. These customers include Telenor, UniCredit, ideeli, McKenney's, Tesco, and SurveyMonkey.
Top Industries
Top Industries
REVIEWERS
Financial Services Firm
20%
Healthcare Company
18%
Retailer
8%
Comms Service Provider
8%
VISITORS READING REVIEWS
Financial Services Firm
18%
Healthcare Company
15%
Comms Service Provider
9%
Marketing Services Firm
8%
No Data Available
REVIEWERS
Financial Services Firm
21%
Retailer
15%
Energy/Utilities Company
12%
Insurance Company
9%
VISITORS READING REVIEWS
Financial Services Firm
17%
Comms Service Provider
11%
Energy/Utilities Company
7%
Manufacturing Company
6%
Company Size
Company Size
REVIEWERS
Small Business
43%
Midsize Enterprise
32%
Large Enterprise
25%
VISITORS READING REVIEWS
Small Business
29%
Midsize Enterprise
35%
Large Enterprise
36%
No Data Available
REVIEWERS
Small Business
20%
Midsize Enterprise
13%
Large Enterprise
67%
VISITORS READING REVIEWS
Small Business
14%
Midsize Enterprise
19%
Large Enterprise
67%
Find out what your peers are saying about Graylog vs Splunk and others in Log Management.
Download now
287,566 professionals have used our research since 2012.
We monitor all Log Management reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.

Sign Up with Email