Store only what's important—keep your log volume under control by excluding noisy logs
Forward your logs to S3 or any other object storage of your choice for compliance or later review
Visualize and aggregate critical events to understand system behavior holistically
Simple to use filters that let you drill down based on app, host, cluster
Search your logs with simple keywords or natural language date ranges without esoteric syntax
Easy to use presence and absence alerting to know when something is wrong
Role-based access controls to limit access to sensitive logs and destructive actions
SSO/SAML for enterprise-grade user authentication
Usage reporting to ensure you’re keeping an eye on your log volume—get alerted or stop ingestion completely as needed