Serilog vs Splunk Cloud

Need advice about which tool to choose?Ask the StackShare community!

Serilog

245
105
+ 1
1
Splunk Cloud

166
437
+ 1
15
Add tool

Serilog vs Splunk Cloud: What are the differences?

  1. Data Collection: Serilog is a logging library for .NET, offering structured log messages that can be captured and analyzed easily. In contrast, Splunk Cloud is a cloud-based platform that collects and indexes log data from various sources, providing real-time insights into operational and security data.
  2. Deployment: Serilog requires integration into the .NET application codebase, making it suitable for on-premises deployment. Meanwhile, Splunk Cloud is a fully hosted service, eliminating the need for infrastructure management and offering scalability and reliability for cloud-based deployments.
  3. Query and Analysis: Serilog provides basic querying capabilities but is primarily focused on structured logging. On the other hand, Splunk Cloud offers advanced search functionalities, machine learning capabilities, and visualization tools for in-depth analysis of log data.
  4. Cost: While Serilog is open-source and free to use, it requires maintenance and setup costs for hosting the logs. In comparison, Splunk Cloud follows a subscription-based pricing model, with costs varying based on the volume of data ingested and features utilized.
  5. Integration: Serilog is designed to integrate seamlessly with .NET applications, providing developers with a familiar logging framework. In contrast, Splunk Cloud offers integration with a wide range of platforms and technologies, allowing organizations to consolidate logs from various sources for holistic monitoring.
  6. Compliance and Security: Splunk Cloud maintains compliance certifications and industry-standard security measures, ensuring data privacy and regulatory adherence. While Serilog offers flexibility in log configuration, organizations using it must implement their security protocols to meet compliance requirements.

In Summary, Serilog and Splunk Cloud differ in terms of data collection methods, deployment options, query capabilities, costs, integration capabilities, and compliance/security features.

Advice on Serilog and Splunk Cloud
Jigar Shah
Security Software Engineer at Pinterest · | 8 upvotes · 148.7K views

We would like to detect unusual config changes that can potentially cause production outage.

Such as, SecurityGroup new allow/deny rule, AuthZ policy change, Secret key/certificate rotation, IP subnet add/drop. The problem is the source of all of these activities is different, i.e., AWS IAM, Amazon EC2, internal prod services, envoy sidecar, etc.

Which of the technology would be best suitable to detect only IMP events (not all activity) from various sources all workload running on AWS and also Splunk Cloud?

See more
Replies (5)
Nati Abebe
Cloud Architect at AWS · | 11 upvotes · 69K views
Recommends
on
AWS ConfigAWS Config

For continuous monitoring and detecting unusual configuration changes, I would suggest you look into AWS Config.

AWS Config enables you to assess, audit, and evaluate the configurations of your AWS resources. Config continuously monitors and records your AWS resource configurations and allows you to automate the evaluation of recorded configurations against desired configurations. Here is a list of supported AWS resources types and resource relationships with AWS Config https://docs.aws.amazon.com/config/latest/developerguide/resource-config-reference.html

Also as of Nov, 2019 - AWS Config launches support for third-party resources. You can now publish the configuration of third-party resources, such as GitHub repositories, Microsoft Active Directory resources, or any on-premises server into AWS Config using the new API. Here is more detail: https://docs.aws.amazon.com/config/latest/developerguide/customresources.html

If you have multiple AWS Account in your organization and want to detect changes there: https://docs.aws.amazon.com/config/latest/developerguide/aggregate-data.html

Lastly, if you already use Splunk Cloud in your enterprise and are looking for a consolidated view then, AWS Config is supported by Splunk Cloud as per their documentation too. https://aws.amazon.com/marketplace/pp/Splunk-Inc-Splunk-Cloud/B06XK299KV https://aws.amazon.com/marketplace/pp/Splunk-Inc-Splunk-Cloud/B06XK299KV

See more
Isaac Povey
Casual Software Engineer at Skedulo · | 6 upvotes · 70.8K views
Recommends
on
TerraformTerraform

While it won't detect events as they happen a good stop gap would be to define your infrastructure config using terraform. You can then periodically run the terraform config against your environment and alert if there are any changes.

See more
Matthew Rothstein
Recommends
on
Security MonkeySecurity Monkey

Consider using a combination of Netflix Security Monkey and AWS Guard Duty.

You can achieve automated detection and alerting, as well as automated recovery based on policies with these tools.

For instance, you could detect SecurityGroup rule changes that allow unrestricted egress from EC2 instances and then revert those changes automatically.

It's unclear from your post whether you want to detect events within the Splunk Cloud infrastructure or if you want to detect events indicated in data going to Splunk using the Splunk capabilities. If the latter, then Splunk has extremely rich capabilities in their query language and integrated alerting functions. With Splunk you can also run arbitrary Python scripts in response to certain events, so what you can't analyze and alert on with native functionality or plugins, you could write code to achieve.

See more
Vijayanand Narayanasharma
DevOps/TechOps Consultant at Qantas Loyalty · | 3 upvotes · 61.9K views
Recommends
on
AWS CloudTrailAWS CloudTrail

Well there are clear advantages of using either tools, it all boils down to what exactly are you trying to achieve with this i.e do you want to proactive monitoring or do you want debug an incident/issue. Splunk definitely is superior in terms of proactively monitoring your logs for unusal events, but getting the cloudtrail logs across to splunk would require some not so straight forward setup (Splunk has a blueprint for this setup which uses AWS kinesis/Firehose). Cloudtrail on the other had is available out of the box from AWS, the setup is quite simple and straight forward. But analysing the log could require you setup Glue crawlers and you might have to use AWS Athena to run SQL Like query.

Refer: https://docs.aws.amazon.com/athena/latest/ug/cloudtrail-logs.html

In my personal experience the cost/effort involved in setting up splunk is not worth it for smaller workloads, whereas the AWS Cloudtrail/Glue/Athena would be less expensive setup(comparatively).

Alternatively you could look at something like sumologic, which has better integration with cloudtrail as opposed to splunk. Hope that helps.

See more
Recommends
on
AWS CloudTrailAWS CloudTrail

I'd recommend using CloudTrail, it helped me a lot. But depending on your situation I'd recommed building a custom solution(like aws amazon-ssm-agent) which on configuration change makes an API call and logs them in grafana or kibana.

See more
Manage your open source components, licenses, and vulnerabilities
Learn More
Pros of Serilog
Pros of Splunk Cloud
  • 1
    It's a logging library
  • 7
    More powerful & Integrates with on-prem & off-prem
  • 3
    Free
  • 3
    Powerful log analytics
  • 1
    Pci compliance
  • 1
    Production debugger

Sign up to add or upvote prosMake informed product decisions

Cons of Serilog
Cons of Splunk Cloud
  • 1
    They are two different things
  • 1
    You can't compare this to seq
    Be the first to leave a con

    Sign up to add or upvote consMake informed product decisions

    - No public GitHub repository available -

    What is Serilog?

    It provides diagnostic logging to files, the console, and elsewhere. It is easy to set up, has a clean API, and is portable between recent .NET platforms.

    What is Splunk Cloud?

    If you're looking for all the benefits of Splunk® Enterprise with all the benefits of software-as-a-service, then look no further. Splunk Cloud is backed by a 100% uptime SLA, scales to over 10TB/day, and offers a highly secure environment.

    Need advice about which tool to choose?Ask the StackShare community!

    What companies use Serilog?
    What companies use Splunk Cloud?
    Manage your open source components, licenses, and vulnerabilities
    Learn More

    Sign up to get full access to all the companiesMake informed product decisions

    What tools integrate with Serilog?
    What tools integrate with Splunk Cloud?

    Sign up to get full access to all the tool integrationsMake informed product decisions

    Blog Posts

    GitHubPythonNode.js+26
    29
    16057
    What are some alternatives to Serilog and Splunk Cloud?
    Logstash
    Logstash is a tool for managing events and logs. You can use it to collect logs, parse them, and store them for later use (like, for searching). If you store them in Elasticsearch, you can view and analyze them with Kibana.
    Seq
    Seq is a self-hosted server for structured log search, analysis, and alerting. It can be hosted on Windows or Linux/Docker, and has integrations for most popular structured logging libraries.
    JavaScript
    JavaScript is most known as the scripting language for Web pages, but used in many non-browser environments as well such as node.js or Apache CouchDB. It is a prototype-based, multi-paradigm scripting language that is dynamic,and supports object-oriented, imperative, and functional programming styles.
    Git
    Git is a free and open source distributed version control system designed to handle everything from small to very large projects with speed and efficiency.
    GitHub
    GitHub is the best place to share code with friends, co-workers, classmates, and complete strangers. Over three million people use GitHub to build amazing things together.
    See all alternatives