ELK Logstash Primary Use Case
It is currently deployed as a single instance, but we are currently looking at clusters. We are using it for a logging solution. I'm a developer and act as a server engineer for DevOps Engineers. It's used by developers and mobile developers. It could be used by quite a few different teams. View full review »
The primary use cases are for infrastructure monitoring networks, security analytics, and SIEM. We are evaluating it for business analytics as well. View full review »
We primarily use the solution to have a correlation on all the Windows event logs. We use it more for forensic purposes now. We are looking for something which will be a more proactive product for us and be able to detect any threats and take automatic action. View full review »
Learn what your peers think about ELK Logstash. Get advice and tips from experienced pros sharing their opinions. Updated: March 2021.
466,017 professionals have used our research since 2012.
ELK Stack is made up of Elasticsearch, Logstash, and Kibana. What we have is considered modified ELK Stack where instead of the Logstash we use Fluentd, but it serves the same purpose as basically a pipe to get the data into the Elasticsearch. We primarily use the solution for everything you could think of from error detection to general logging and auditing, to security awareness. View full review »
This solution is primarily used for log services and network appliances. Our director proposed that we buy six virtual machines with the six logs and about three bytes of storage. We use the solution on this. View full review »
I was using this product up until recently when I changed companies, but I have been asked to implement logging in my new role and this is one of the options that I am considering. It was used in conjunction with Kibana to examine our logs and perform debugging. When a user complained about misbehavior in an application, we would research the logs, test, and try to find out where the bug is. View full review »
We used this solution for gathering our application logs and analyzing application behavior. View full review »
We use Logstash to retrieve data from our servers, from different sources, to our Elastic Stack. There, Elastic Search allows us to search it, and we can visualize the data with Kibana. View full review »
We are a service provider, and use this solution to work with our customers. We use this solution for collecting firewall logs and then supplying them to the log analyzer. We are running Fortinet FortiGate for our firewall, and these are the logs that we are analyzing. Normally, we have a problem with the visualization part. View full review »
The primary use of this solution is to gather authentication information and use it to determine which identity provider is breaking on which service provider. We store it as anonymized session information for each user. View full review »
We are using ELK Logstash for application log management and fault detection. View full review »
We use this solution for the Microsoft deployment of auto-management. View full review »
The primary use case of this solution is for IT monitoring, predictive maintenance, and anomaly detection. View full review »
Learn what your peers think about ELK Logstash. Get advice and tips from experienced pros sharing their opinions. Updated: March 2021.
466,017 professionals have used our research since 2012.