Its flexibility is most valuable. We can have a number of scenarios, and we can get logs from anything. If we know how to use Logstash, we can tweak it in many ways. This makes the logging search on Elastic very easy.
Elastic Security is a robust, open-source security solution designed to offer integrated threat prevention, detection, and response capabilities across an organization's entire digital estate. Part of the Elastic Stack (which includes Elasticsearch, Logstash, and Kibana), Elastic Security leverages the power of search, analytics, and data aggregation to provide real-time insight into threats and vulnerabilities. It is a comprehensive platform that supports a wide range of security needs, from...
ELK is open-source, and it will give you the framework you need to build everything from scratch.
The most valuable feature is the search function, which allows me to go directly to the target to see the specific line a customer is searching for.
Its flexibility is most valuable. We can have a number of scenarios, and we can get logs from anything. If we know how to use Logstash, we can tweak it in many ways. This makes the logging search on Elastic very easy.
Enables monitoring of application performance and the ability to predict behaviors.
The solution is quite stable. The performance has been good.
We've found the initial setup to be quite straightforward.
I like the indexing of the logs.
The cost is reasonable. It's not overly pricey.
The indexes allow you to get your results quickly. The filtering and log passing is the advantage of Logstash.
The feature that we have found the most valuable is scalability.
The solution has a good community surrounding it for lots of helpful documentation for troubleshooting purposes.
The most valuable feature for me is Discover.
I use the stack every morning to check the errors and it's just so clear. I don't see any disadvantage to using Logstash.
ELK Logstash is easy and fast, at least for the initial setup with the out of box uses.
The most valuable feature is the ability to collect authentication information from service providers.
It's simple and easy to use.
The visualization is very good.
It is the best open-source product for people working in SO, managing and analyzing logs.