Sematext Logagent
Logagent is a robust, flexible, open-source, and cloud-native data shipper for Application, Server, and Container Logs.
Sematext Logagent Alternatives
The best Sematext Logagent alternatives based on verified products, community votes, reviews and other factors.
-
/fortinet-fortianalyzer-alternatives
Fortinet FortiAnalyzer is a powerful product for Security Fabric Analytics and Automation.
-
/beats-alternatives
Beats is the platform for single-purpose data shippers that is installed as lightweight agents and send data to machines to Logstash or Elasticsearch.
-
Try for free
DCIM software reinvented.
-
/wazuh-alternatives
Open Source Host and Endpoint Security
-
/syslog-ng-alternatives
Syslog-ng decreases the quantity and improves the quality of data, thus enhancing the capacities of your SIEM solution.
-
/rsyslog-alternatives
Rsyslog is an enhanced syslogd supporting, among others, MySQL, PostgreSQL, failover log...
-
/fluentd-alternatives
Fluentd is a cross platform open source data collection solution originally developed at Treasure Data.
-
/riemann-alternatives
Container Monitoring
-
/logstash-alternatives
logstash is a tool for managing events and logs.
-
/manageengine-recoverymanager-plus-alternatives
RecoveryManager Plus is one such enterprise backup solution which has the ability to easily backup and restores both the domain controllers and virtual machines.
-
/heroku-enterprise-alternatives
Heroku Enterprise is a flexible IT management for developers that lets them build apps using their preferred languages and tools like Ruby, Java, Python and Node.
-
/lastpass-alternatives
LastPass is an online password manager and form filler that makes web browsing easier and more secure.
-
/secdo-alternatives
SECDO offers automated endpoint security and incident response solutions
-
/traverse-monitoring-alternatives
Traverse Monitoring is an IT Management software that provides businesses with a network monitoring solution which is capable of handling the tasks of monitoring private clouds, distributed network infestation and virtualized infrastructure.