--
Logs (24h)
--
Active Sources
--
Open Alerts
--
Active Rules
Log Volume (24h)
Severity Breakdown
Top Sources
Recent Alerts
| Timestamp | Source | Severity | Facility | App | Message |
|---|---|---|---|---|---|
Loading logs... | |||||
0 logs
Page 1
Log Sources
No sources yet
Point your devices' syslog output at this server to auto-discover sources.
Alert Rules
Triggered Alerts
Windows Event Log Collectors
Enterprise feature -- collect from local or remote Windows machines
Targets:
0
Running:
0
Total Events:
0
pywin32:
--
pywinrm:
--
No Windows Event Log targets
Add a local or remote Windows machine to start collecting event logs.
Requires Enterprise license.
Requires Enterprise license.
Security Product Connectors
Pull alerts from CrowdStrike, SentinelOne, Defender, Sophos, Cortex XDR, or any REST API
Connectors:
0
Running:
0
Total Events:
0
requests lib:
--
No security connectors configured
Connect CrowdStrike, SentinelOne, Defender, Sophos, Cortex XDR, or a generic API.
Requires Enterprise license and the
Requires Enterprise license and the
requests library.Inbound Webhooks
Receive push events from any security tool via HTTP POST
No webhooks created yet.
Cross-Source Correlation Engine
Detect attack patterns spanning multiple log sources and event types
Rules:
0
(0 enabled)
Open Incidents:
0
Total Incidents:
0
Buffer:
0 events
Correlation Rules
No correlation rules defined
Create rules to detect multi-source attack patterns.
Requires Pro or Enterprise license.
Requires Pro or Enterprise license.
Correlation Incidents
No correlation incidents yet.
Compliance Reports
Generate audit-ready reports for PCI-DSS, HIPAA, SOC 2, NIST CSF, CIS Controls
Report History
No reports generated yet.
Log File Targets (Linux / Mac)
Tail log files on this machine. Supports syslog-style and ISO-timestamped log files.
Common paths: /var/log/syslog, /var/log/auth.log, /var/log/messages, /var/log/secure
No file targets configured. Click + Add File Target to start.
Notification Channels
Receive alerts via email (SMTP) or webhook when alert rules fire. Pro tier and above.
No notification channels configured.
Notification Log
No notifications sent yet.
Log Forwarding Targets
Forward processed logs to an external syslog server, SIEM, or webhook endpoint. Apply filters to forward only matching logs.
No forwarding targets configured.
API Key Management
Generate API keys for programmatic access. Pass via X-API-Key header or ?api_key= query param.
Enable API auth in Settings to require keys for all API calls.
No API keys generated.