Now in Public Beta

Your logs, investigated by AI.

Find root causes in seconds, not hours. LogPulse uses AI to investigate your incidents — backed by a Splunk-familiar query language and EU hosting. Free to start, paid plans from €29/month.

app.logpulse.io/search
Production Errors2
Last 1 hour
level=er
Type a query and press Search
AI Investigator

From Error Spike to Root Cause in Seconds

When a service errors at 14:32, the AI investigates automatically — correlating the spike with a deploy at 14:28, identifying the downstream rate-limit that started failing, and telling you what happened in plain English with the supporting log lines linked. No query writing, no jumping between dashboards.

AI Investigator
Online
Ask a follow-up question...

Root Cause Analysis, Automated

The investigator runs queries, correlates deploys, and follows every lead — so you get a complete answer, not just a list of matching log lines.

Targeted Log Search

Automatically writes and runs queries scoped to the right service, time window, and error type — no LPQL knowledge needed.

Deploy & Event Correlation

Links error spikes to recent deploys, config changes, and downstream events to pinpoint the triggering commit or release.

Historical Baseline

Compares current behavior against 30 days of history to tell you whether the issue is new, recurring, or part of a trend.

Multi-Turn Conversations

Ask follow-up questions naturally. The agent remembers context and builds on previous findings.

Investigation Depth

Fast
Balanced
Deep Analysis
See It In Action

Built for Speed and Clarity

Watch how LogPulse transforms raw logs into actionable insights in seconds.

app.logpulse.io/search
Production Errors2
Last 1 hour
Type a query and press Search
app.logpulse.io/pipelines/prod-ingestion
Production Log Ingestion
TRIGGER
Webhook Trigger
EXTRACT
Fetch Metadata
TRANSFORM
Parse JSON
TRANSFORM
Redact PII
FLOW
Check Level
level = error
else
TRANSFORM
Enrich from CMDB
TRANSFORM
Normalize Fields
LOAD
Ingest → Alerts
LOAD
Ingest → Logs

Search billions of log entries with LPQL — our Splunk-compatible query language. Full syntax highlighting, auto-complete, and results in milliseconds.

Sound Familiar?

You're not the only one.

  • Your team is still grep-ing through log files to debug production issues at 3 AM.

  • You're paying enterprise prices for Splunk or Datadog — and only using <10% of the features.

  • Alert fatigue is real. 50%+ of your pages are false positives that nobody trusts anymore.

  • Log storage costs are growing faster than your revenue. Retention policies are a constant negotiation.

  • PII in logs keeps you up at night. Every audit is a fire drill.

You need a platform that solves these problems — not another tool that adds complexity.

Visual Builder

Build Powerful Pipelines

Transform, enrich, and route your log data with a drag-and-drop pipeline editor. No code required — but full JavaScript support when you need it.

Pipeline Editor
Active
TRIGGER
Webhook Trigger
EXTRACT
Fetch Metadata
TRANSFORM
Parse JSON
TRANSFORM
Redact PII
FLOW
Check Level
level = error
else
TRANSFORM
Enrich from CMDB
TRANSFORM
Normalize Fields
LOAD
Ingest → Alerts
LOAD
Ingest → Logs

Extract & Connect

Pull data from HTTP APIs, Splunk, or webhooks. Full authentication support including multi-step auth flows.

Transform & Parse

Parse JSON and CSV, map to standard schemas (ECS, OTEL, CIM), run field operations, or write custom JavaScript.

Flow Control

Add conditional branching with 11 operators, fan arrays out with split/join, and control pipeline execution flow.

PII Redaction & Compliance

Automatically mask emails, credit cards, SSNs, API keys, and more with 8 preset patterns — before data hits storage.

Trigger Modes

Scheduled
Webhook
Manual

Four Capabilities, One Platform, Zero Compromises

Everything your team needs to search, detect, connect, and transform log data — without juggling five vendors.

Lightning-Fast Search

Query billions of log entries and get results back before you finish your thought. LPQL — our purpose-built query language — lets your team filter, aggregate, and visualize with syntax they can learn in minutes, not weeks.

<200msP95 search latency

Anomaly Detection That Learns

AI-powered baselines learn your services' normal behavior and alert you when something actually matters. No more manually tuning thresholds. The system adapts to your feedback — fewer false positives over time, not more.

85%fewer false alerts

Connect Your Entire Stack

Planned native integrations with AWS, GCP, Azure, Kubernetes, Docker, and more. One-click setup, zero YAML engineering. Your logs start flowing in minutes, not days.

8+Native Integrations

Visual Pipelines

Transform, enrich, and route log data with a drag-and-drop editor. Mask PII before it hits storage, map to standard schemas, and reduce costs by filtering noise — no code required, but full JavaScript when you need it.

18node types
OpenTelemetry

Native Support for OTLP

Send logs and traces using the OpenTelemetry Protocol — the industry standard for observability data. Drop in your existing OpenTelemetry Collector or SDK configuration and start shipping data to LogPulse in minutes.

OTLP Logs

Ingest OpenTelemetry log records with automatic severity mapping, Kubernetes metadata extraction, and trace context correlation.

OTLP Traces

Capture distributed traces with span metadata, duration tracking, and HTTP attribute extraction — all searchable via LPQL.

otel-collector-config.yaml
# OpenTelemetry Collector → LogPulse
exporters:
  otlphttp/logpulse:
    endpoint: "https://api.logpulse.io"
    headers:
      Authorization: "Bearer $API_KEY"

service:
  pipelines:
    logs:
      exporters: [otlphttp/logpulse]
    traces:
      exporters: [otlphttp/logpulse]
OTel Collector
OTel SDKs
K8sAuto-discovery

Simple, Transparent Pricing

Beta access is live now. Official pricing launches Q2 2026.

Free

For developers evaluating log management

€0

100 MB/day • 7 days retention

  • 100 MB/day log ingestion
  • Basic LPQL search
  • Up to 2 team members
  • 7 days retention

Starter

For small teams getting started with log management

€29/mo

1 GB/day • 14 days retention

  • 1 GB/day log ingestion
  • Full LPQL search & dashboards
  • Up to 3 team members
  • Community support
Most Popular

Pro

For growing teams that need more power and integrations

€59/mo

5 GB/day • 30 days retention

  • Everything in Starter
  • 5 GB/day log ingestion
  • Up to 10 team members
  • Alerts & cloud integrations
  • Visual pipeline builder

Business

For organizations with compliance and scale requirements

€159/mo

25 GB/day • 90 days retention

  • Everything in Pro
  • 25 GB/day log ingestion
  • Unlimited team members
  • Priority support & SLA
  • PII redaction & compliance pipelines
Beta Access Live

Lock In Founder Pricing

We're finalizing pricing with our beta customers. Sign up now to lock in founder rates for 12 months, regardless of what official pricing becomes.

Founder pricing locked for 12 months
Direct influence on roadmap
Dedicated onboarding support
Early access to new features
Get Started Free

Official pricing launches Q2 2026

Pricing FAQ

When will official pricing be available?+
Q2 2026. Beta customers will be notified 30 days before launch and can choose to lock in founder rates or move to standard pricing.
What happens after 12 months of founder pricing?+
You can renew at current market rates, or we'll honor founder pricing if you've been an active user — evaluated case-by-case.
Can I switch tiers during beta?+
Absolutely. Upgrade anytime, downgrade at renewal. No lock-in contracts.
Is there a free trial?+
The free plan is free forever. No credit card required, no time limit. Upgrade when you're ready.
What's included in founder pricing?+
Access to the full platform at rates 30-40% below planned official pricing. Exact amounts will be communicated before the official launch.
Public Beta

Built for Platform Engineering teams

LogPulse is in public beta. Instead of fake testimonials, here is exactly what we stand for.

EU-native
Data stays in the Netherlands. GDPR-first architecture with a published sub-processor list.
ClickHouse-powered
Sub-200ms P95 search across billions of log events using the same engine that powers Cloudflare and Uber.
OpenTelemetry-first
Native OTLP ingest, Vector, Helm chart, and a HTTP API — no proprietary agents required.
AI investigator built-in
Claude-powered investigations that turn a vague alert into a root-cause hypothesis in minutes.

Ready to Stop Firefighting and Start Fixing?

Free to start. No credit card. No sales call. Your first query in under 5 minutes.

We use cookies to analyze site traffic and improve your experience. No cookies are placed without your consent. Privacy Policy