See how you can save 70% of the cost by reducing log volume and staying compliant.

See how you can save 70% of the cost by reducing log volume and staying compliant.

01

TELEMETRY Pipelines

With a Mezmo Telemetry Pipeline you can ingest telemetry data from a wide variety of sources, profile it to gain insights into its composition, and then use a variety of processors to transform, reduce, and route it to multiple tools. If your data includes Personally Identifying Information (PII), you can also redact and encrypt it to meet data compliance requirements before sending it to your observability tools or storage.

• Mezmo Telemetry Pipelines Overview
Getting Started with Mezmo Telemetry Pipelines
Build and Deploy a Mezmo Telemetry Pipeline
Set Up Pipeline Sources
Set Up Pipeline Destinations
Set Up Pipeline Processors
Pipeline Examples and Tutorials

TITLE LOREM

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock.

EXAMPLE 2

02

Data
Profiling

With Mezmo’s Data Profiling features, you can understand the composition of your data, identify common message patterns, and optimize the processing of those messages to reduce log volume and extract meaningful information.

TITLE LOREM

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock.

EXAMPLE 1

03

Next Gen Log Management

Next Gen Log Management Log management powered by a telemetry pipeline helps you collect all the data you need, separate signals from noise, and search and analyze telemetry data more quickly. Our Log Management Product Guide provides a complete overview of all our features, including the ability to search telemetry data, create views and graphs for data, and set alerts and notifications.

TITLE LOREM

Contrary to popular belief, Lorem Ipsum is not simply random text. It has roots in a piece of classical Latin literature from 45 BC, making it over 2000 years old. Richard McClintock.

EXAMPLE 3

Struggling to
Keep Up with Log Volumes?

Start the free trial.
Use at least 8 characters, and must include at least 3 of the following: uppercase, lowercase, numeric, or special characters.
Thank you! If you already have an account,please sign in here.
Oops! Something went wrong while submitting the form.

WHAT IS Mezmo TELEMETRY PIPELINE

Interactive Demos

Want to learn more about how Mezmo’s data processors and features can help you understand, optimize, and respond to your telemetry data?
Check out our interactive demos!

  • Filter: Use the Filter Processor to drop events that may not be meaningful or to reduce the total amount of data forwarded to a subsequent processor or destination.
  • Reduce: Take multiple log input events and combine them into a single event based on specified criteria. Use Reduce to combine many events into one over a specified window of time.
  • Sample: Send only the events required to understand the data.
  • Dedupe: Reduce “chatter” in logs. The overlap of data across fields is the key to having the Dedup Processor work effectively. This processor will emit the first matching record of the set of records that are being compared.
  • Route: Intelligently route data to any observability, analytics, or visualization platform.

Kubernetes Data Optimization

Our Practitioner’s Guide to Data Optimization includes an example of a telemetry pipeline designed specifically for Kubernetes data optimization. Check it out for an overview of the pipeline architecture, the processor configurations, and instructions for installing an OTel collector so you can try it out with your own data.

  • Event to Metric: Create a new metric within the pipeline from existing events and log messages.
  • Parse: Various parsing options available to create multiple operations such as convert string to integers or parse timestamps.
  • Aggregate metrics: Metric data can have more data points than needed to understand the behavior of a system. Remove excess metrics to reduce storage without sacrificing value.
  • Encrypt: Use the Encrypt Processor when sending sensitive log data to storage, for example, when retaining log data containing account names and passwords.

Searching for a better observability solution.

"Mezmo helped the Sysdig team to achieve an 80 percent improvement in the time it takes to access and use log data." Read More.
Mark Breitung, Senior DevOps Engineer at Sysdig
Sysdig

View & Manage All Your Logs in One Place

"I like to be able to go to that point in time in the logs, getting the context before and after the line. It's great to be able to create a special "view" and view logs in real-time from a specific log file or server."
Guillermo H., CTO

A Great Logging Tool!

"The searchable database for error logs is top notch and one of the best out there. Incredibly easy GUI to find, diagnose, and detect issues."
Ryan C., Founder & CEO