Get started for free and be amazed at what you'll find!

We automatically catch critical incidents and show you root cause! No configuration.

 

 

 

 

 

 

Getting started takes two minutes:

  • Enter your details
  • Cut and paste two helm or kubectl commands 
  • Reliable incident detection will start within the first hour

No credit card required. Free for first 30 days and then free forever for 500MB/day with 7 day retention.

Please read our FAQ below for more information.

 

Frequently Asked Question

 

Within a minute you'll receive an email with your account credentials (if you don't see it, check your junk folder). When you first login, a screen will appear with customized instructions to install our log collector.

In Kubernetes this involves two Helm or  kubectl commands. The collector is lightweight, runs as a daemonset and is secure. Then, within a minute or two, your data will start appearing in the UI.

Watch this 1.5 minute video that shows you how.  

GETTING STARTED VIDEO

We adhere to industry best practices for security including: encryption of data in flight, AES-256 encryption of data at rest, optional granular removal of sensitive records or fields, secure isolation of customer data and option for a dedicated instance and VPC. All customer data will be deleted upon termination of service or by request. Details of our security policy can be found here. Users can also specify particular events to filter out, if they contain sensitive data. 

Zebrium uses modified versions of popular open source Fluentd and Prometheus collectors for log and metrics collection. You can find docs and details here. Both services have a lightweight footprint. Log collection is currently supported on Kubernetes, Linux and CloudWatch, and metrics are suported on Kubernetes. Details on how Fluentd collects Kubernetes meta-data can be found in this blog.

All Zebrium log and metrics collectors use an authentication token to securely deliver data to your account (your token is private and can be found in Settings / Log Collector). Please keep this token safe and do not share it with others. 

Please see details on our product page here.

By default, alerts are sent by email and are also posted in your private channel on the Zebrium Slack community.

If you would like to change email settings or send alerts to a Slack channel of your choice, please login to your account and go to the Notifications page in the Settings menu. 

From the moment data arrives, our machine learning will begin structuring your logs and learning patterns. After that, just sit back and wait for it to detect incidents. 

Our goal is to achieve reliable incident detection within the first hour - with absolutely zero configuration required.

Please send questions via your Slack channel or by emailing hello@zebrium.com.