Proactive log monitoring with Splunk Light
March 02, 2018

Proactive log monitoring with Splunk Light

Pooja Gada | TrustRadius Reviewer
Score 8 out of 10
Vetted Review
Verified User

Software Version

Splunk Light (legacy)

Overall Satisfaction with Splunk Enterprise

Splunk Light is used by the engineering team. The main use case it targets - is proactive log monitoring. We wanted to integrate a system, which does log monitoring(application + system logs) and send us alerts if the system identifies errors or warning. Additionally, the solution needed to be HIPAA compliant. So instead of Splunk Enterprise or Splunk Cloud, we ended up choosing Splunk Light, as we can manage the infra on our own.
  • Real-time + Scheduled alerts - i-e you can set up alerts which are actively monitoring your logs
  • Pretty good response time for search results. With our key/value logging, Splunk makes it blazing fast to query the data.
  • Dashboards provide insights into historical data
  • Love how Splunk indexes all of the data and provides keys to search on
  • Splunk light limits number of users to 5. Wish there was a flexible license, where one could add more users.
  • Splunk light does not let you add > few realtime alerts. Wish there was a flexible license, where one could add as many realtime alerts as wanted.
  • Better insight into daily ingestion values
  • Helped us be more proactive about issues
  • Helped us understand our system usage
  • Helped us invest in areas we previously did not think of
ELK stack required too much infrastructure/configuration, NewRelic was expensive.
Splunk light is awesome for anyone wanting to do proactive monitoring. It is also really well suited for insights into data with dashboards. Splunk light might not be a great choice if you do not want to manage the infrastructure on your own.

Splunk Enterprise Feature Ratings

Centralized event and log data collection
Event and log normalization/management
Deployment flexibility
Integration with Identity and Access Management Tools
Custom dashboards and workspaces
Host and network-based intrusion detection