On-premises edition now available

Learn More


Currently supported:

Any application using:

supported platforms include kubernetes linux cloudwatch docker and syslog

Kubernetes (K8s, Openshift, EKS, etc.), Linux, Elastic Stack (via Logstash), Docker, ECS/Docker, syslog or CloudWatch.

Coming soon:

VMware, Windows and more.

If your platform is not yet supported, please enter your details and we'll notify you as soon as it's available.

After entering your details you'll be redirected to a page where you can set your password and login. Once you've logged in, you'll see customized instructions to install our log and metrics collectors.

In Kubernetes this involves two Helm or  kubectl commands. The collector is lightweight, runs as a daemonset and is secure. Then, within a minute or two, your data will start appearing in the UI.

Watch this 90 second video that shows you how.  

We adhere to industry best practices for security including: encryption of data in flight, AES-256 encryption of data at rest, optional granular removal of sensitive records or fields, secure isolation of customer data and option for a dedicated instance and VPC. All customer data will be deleted upon termination of service or by request. Details of our security policy can be found here. Users can also specify particular events to filter out, if they contain sensitive data. 

Zebrium uses modified versions of popular open source Fluentd and Prometheus collectors for log and metrics collection. You can find docs and details here. Both services have a lightweight footprint. Log collection is currently supported with Kubernetes, Linux, Docker, syslog and CloudWatch, and metrics are supported on Kubernetes. More platforms including Docker, ECS, VMware and Windows are coming soon. 

All Zebrium log and metrics collectors use an authentication token to securely deliver data to your account (your token is private and can be found in Settings / Log Collector). Please keep this token safe and do not share it with others. 

Please see details of how it works here.

By default, alerts are sent by email and are posted in your private channel on the Zebrium Slack community.

If you would like to change email settings or send alerts to a Slack channel of your choice, please login to your account and go to the Notifications page in the Settings menu. 

From the moment data arrives, our machine learning will begin structuring your logs and learning patterns. After that, just sit back and wait for it to detect incidents. 

Our goal is to achieve reliable incident detection within the first hour - with absolutely zero configuration required.

Please send your questions to hello@zebrium.com.