Most Helpful Review
UDP is a fast and lightweight protocol, perfect for sending large volumes of logs with minimal overhead.
Storing logs in Elasticsearch means log retrieval is extremely fast, and full text search is available by default.
We run a containerized microservices environment. Being able to set up streams and search for errors and anomalies across hundreds of containers is why a log aggregation platform like Graylog is valuable to us.
Allowing us to set up alerts and integrate with platforms we already use, such as Slack and OpsGenie to alert users of these errors proactively, is also a very useful feature.
It is used as a log manager/SIEM. It provides visibility into the infrastructure and security related events.
The build is stable and requires little maintenance, even compared to some extremely expensive products.
It is a one stop shop as a full monitoring and alerting solution for operations and application analysis for most of our back-end systems.
We used it to create a custom anomaly detection data model to monitor the activity of our back-end services on an hourly basis relative to the past three months of activity.
Capability to expand the functionality through custom code for data inputs, commands, visualization, alerts, and machine learning.
Splunk has significantly helped with aggregation and correlation of critical logs. Not having to grep on each individual server has made everyone more efficient.
Elasticsearch recommendations for tuning could be better. Graylog doesn't have direct support for running the system inside of Kubernetes, so it can be challenging to fill in the gaps and set up containers in a way that is both performant and stable.
We ran into problems with Elasticsearch throwing a circuit-breaking exception due to field data size being too large. It turned out that the heap size directly impacted this size in a high-throughput environment, causing unexplained instability in Graylog. We were able to troubleshoot on the Elasticsearch size, but we should have been able to reference some minimum requirements for Graylog to know that our settings weren't sufficient.
Since container orchestration systems are popular and Graylog fits the niche well, perhaps they could officially support running in docker containers on Kubernetes as a StatefulSet as a use case. That way, the declarative nature of Kubernetes config files would document their best case deployment scenario-
Over six months, I had two similar issues where searches were performed on field "messages". It exhausted all the memory of the ES node causing an ES crash and a Graylog halt.
It needs to improve the way to install third-party apps and enable installation without logging into splunk.com.
I think the machine learning should be emphasized. Now, it's really important to analyze Big Data, data mining. A SIEM solution, like Splunk, needs an improved data mining solution, artificial intelligence.
While scheduled reports can be embedded, Splunk dashboard can not be embedded directly without enabling cross origin.
DMC should be a little more intuitive with better dashboarding. Seeing the cause of data flow can be tough to track down.
It can be tough to get a hold of somebody in technical support depending on the complexity of the issue.
Pricing and Cost Advice
It is possible to use a developer's license, which is up to 10GB per day of volume traffic, which is usually enough for most use cases.
Free Splunk license for PoCs on personal machines and the ability to scale the PoC to an enterprise level app.
It can be expensive, especially the licensing costs. However, there is added value in what it can do, not just log aggregation.
It is a pretty high cost solution, but if your organization has the funds, it can bring many benefits.
Personnel costs are saved by not having to involve the domain developers from multiple teams when tracing a problem that spans multiple platforms.
Truly evaluate the data you want to ingest and go slow. Pulling in data that can provide no use to your mission only wastes data against your license.
Compared 53% of the time.
Compared 23% of the time.
See more Graylog competitors »
Compared 7% of the time.
Compared 19% of the time.
Compared 14% of the time.
See more Splunk competitors »
Compared 8% of the time.
Also Known As
|Also Known As||Graylog2|
Splunk software has been around since 2006 and the company has since grown to become an industry leader. Splunk's vision is to make machine data accessible, usable and valuable to everybody. The company offers a wide range of products to turn machine data into valuable information by monitoring and analyzing all activities. This is known as Operational Intelligence and is the unique value proposition of Splunk.
Splunk is well-known for its Log Management capabilities and also for its Security Information and Event Management (SIEM) solutions.
Learn more about Graylog
Learn more about Splunk
|Sample Customers||Blue Cross Blue Shield, eBay, Cisco, LinkedIn, SAP, King.com, Twilio, Deutsche Presse-Agentur||Splunk has more than 7,000 customers spread across over 90 countries. These customers include Telenor, UniCredit, ideeli, McKenney's, Tesco, and SurveyMonkey.|
No Data Available
VISITORS READING REVIEWS
No Data Available
VISITORS READING REVIEWS