Troubleshooting 2018-01-31T15:24:25+00:00


Quickly identify and resolve problems.

Logtrust is ideal for troubleshooting. It supports data from any infrastructure element and enables searches in very large data sets (terabytes and petabytes). It is used to accelerate troubleshooting across servers and applications. It also allows users to diagnose network issues by searching logs from routers and other devices.

Once you have sent all the data to Logtrust, you can look for anything in a very intuitive way. In the Search view, the Data Source Manager acts like a file manager, allowing you to browse all the information,, drilling down from source technology to source brand and then to another two levels of customized data types.

After selecting one data type you will see a handful of predetermined fields ordered by columns. Logtrust does not modify any of the input data, it just organizes the information in a structured format for you, in real-time. This visualization is extremely helpful to identify outliers in these data sets. You will not need to search for a specific term or execute complex queries to get the results you want. There are a number of tools that you can use such as Data Summary with the top values of each field that will be displayed by just clicking a column header. There is also a Time picker to select the period over which to retrieve events.

Pressing Intro on your keyboard over any value will display an assistant that can help you apply filters, create new columns, and make a variety of operations.

Logtrust has proven to be a platform that resolves problems quickly. According to our customers, they have experienced a 75% reduction in the average times to repair, and after a short period using Logtrust they have been able to accelerate response times to improve the availability of applications, networks and servers.

Logtrust helps you to accelerate troubleshooting across servers and applications. It also allows to diagnose network issues by searching logs from routers and other devices.

Reduce the time to respond to incidents finding easily the root cause in a matter of minutes.

  • Chief Security Officers
  • Security Administrators
  • System Administrators
  • Chief Compliance Officers
  • Chief Information Officers
  • Chief Technology Officers
  • IPs
  • Firewalls
  • Routers
  • Servers
  • Proxys
  • Webservers