SiftLog Platform
SiftLog Platform ingests log streams from every source in your infrastructure, merges them in real time, and surfaces the origin of failures automatically. Cascade, anomaly, silence - detected and named, in under a second.
The Problem
You have engineers on a bridge call. Multiple dashboards open. Log streams from a dozen services scrolling in separate windows. The dashboard says latency is up and error rate is spiking.
It does not tell you which service failed first. It does not tell you whether this is a cascade from an upstream dependency. It does not tell you how long the affected services have been degraded.
Every engineer on that call is manually reading logs, comparing timestamps across systems with different clock configurations, trying to reconstruct a timeline inside their head. This takes 20 to 40 minutes in a well-run organization. It takes longer in a complex one.
When service A begins failing and service B starts degrading within a configurable time window - particularly when events share a trace ID - SiftLog identifies the origin service and names the propagation chain in order.
Per-service error rates are tracked against a rolling baseline. When a service exceeds the configured multiple of its recent error rate, it is flagged before your alerting thresholds fire.
A service that stops logging is often the most important signal. SiftLog tracks per-service event volume and flags services that go quiet - a failure mode that manual log review consistently misses.
See It Work
An infrastructure issue causes a database connection pool in the auth service to exhaust. Within seconds, four services are generating thousands of error events. The other 16 are fine - and their normal INFO volume is drowning out the signal entirely. A senior engineer joins the bridge call and spends 15 minutes correlating timestamps manually. Nobody has the full picture yet. SiftLog, running continuously against all 20 sources, already does:
The cascade origin is auth-service. The propagation chain is named in order. The silence flag on inventory-service - a separate, unrelated issue - would have been invisible until someone noticed the service was gone. It is surfaced automatically. The 16 healthy services contributed zero noise.
Deployment
A single self-contained binary. No runtime dependencies. No container orchestration requirements. No changes to your existing infrastructure.
Log Sources
No agents. No sidecars. No schema requirements. No changes to your services or your log format. SiftLog connects to the aggregation layer you already have.
File-based input supports glob patterns and tail mode. Additional sources planned.
Privacy & Air-Gapped Operation
This matters for financial services, healthcare, defense contractors, and any organization with strict data residency requirements. Enterprise agreements with fully air-gapped activation are available.
Talk to Us About EnterpriseOpen Source Foundation
SiftLog began as an open source Go library (MIT license). The correlation engine, all three signal detectors, and all adapter implementations are open source and can be reviewed in full before you buy anything.
The CLI is free. Run it against your logs today. No account, no signup, no credit card. Organizations evaluate the CLI first and license the Platform when they need it running continuously in production.
Explore the Open Source LibraryWhy This Exists
There is a gap between "the dashboard says something is wrong" and "I know what is wrong." Dashboards are good at the first thing. They are not built for the second thing. The second thing requires reading logs across services in time order, which every engineer has done manually at 2am at some point.
"I spent three years complaining about the gap between 'the dashboard says something is wrong' and 'I know what is wrong.' I built SiftLog at 2am on a Tuesday when I couldn't sleep and the problem was still interesting. If it helps you, it was worth the Tuesday."
- Jeff Mutschler, M Media Software Lab
Licensing
One license covers one running instance on one server. After purchase, your license key and binaries for all five supported platforms are delivered by email within one business day. SHA-256 checksums are included with every release.
M Media Software Lab is a registered US vendor (DUNS and EIN on file) and eligible for purchase order and net-terms procurement. Enterprise agreements with multi-site deployment, air-gapped activation, SLA, and vendor onboarding support are available.
Questions - license@mmediasoftwarelab.com
Tell us your deployment size and log sources. We respond within one business day. Volume and enterprise pricing available on request.