Skip to content

Introduction

Seerflow is a streaming, entity-centric log intelligence agent that detects operational failures and security threats across log sources.

Modern infrastructure generates millions of log events per day across dozens of sources — syslog, CloudWatch, GCP Logging, Azure Monitor, Kubernetes, and application logs. Existing tools either:

  • Alert on individual log lines (noisy, miss context)
  • Require complex query languages (slow, reactive)
  • Use expensive LLMs for everything (cost-prohibitive at scale)

Seerflow combines traditional ML (fast, cheap) for bulk detection with LLMs (accurate, explanatory) for edge cases:

LayerTechnologyPurpose
Template extractionDrain3Reduce millions of log lines to thousands of patterns
Anomaly detectionHalf-Space Trees, Holt-Winters, CUSUM, MarkovReal-time online learning — no training phase
Auto-thresholdsDSPOT (EVT)Self-tuning alert thresholds that adapt to drift
Security rulespySigma (3,000+ SigmaHQ rules)MITRE ATT&CK mapped detection
CorrelationEntity graph (igraph)Cross-source, entity-centric threat detection
Root causeLLM (optional)Human-readable explanations for complex alerts
  • Entity-centric: Events are linked to users, IPs, hosts, processes, files, and domains
  • Streaming: Online learning algorithms that update with every event — no batch retraining
  • Zero-config: SQLite backend works on first run; scale to PostgreSQL when needed
  • Open source: Apache 2.0 license