select * from logs;
Open source SIEM for instant log insights, powered by DuckDB. Analyze millions of events in seconds, right from your terminal.
Fall in love with blazing fast log analysis, and stay for our incredible community!
Features
Hunt threats with open-source SIEM tooling
Cloud logs, SQL insights
Tailpipe collects logs from cloud, container and application sources. Query and analyze your data instantly with the power of SQL, right from your terminal.
Fast, local, and efficient
Tailpipe runs locally, powered by DuckDB's in-memory analytics and Parquet's optimized storage. Delivering high performance at low cost, it scales to handle massive datasets without expensive infrastructure.
An ecosystem of prebuilt intelligence
Get started fast with Powerpipe mods: MITRE ATT&CK-aligned queries, prebuilt detections, benchmarks, and dashboards. Open source and community-driven, Tailpipe comes ready with hundreds of examples to supercharge your analysis.
Built to build with
Define detections as code, extend functionality with plugins and write custom SQL queries. Tailpipe is open source and designed for developers to adapt, extend and make it their own.
Use Cases
Insights across Security, Performance, and Cost
Are there repeated failed login attempts?
Threat Huntingselect event_name, user_identity, source_ip_address, count(*) as attemptsfrom aws_cloudtrail_logwhere event_name like '%Login%' and error_code = 'Failed'group by event_name, user_identity, source_ip_addresshaving count(*) > 5;
What resources were touched in the last hour?
Change Auditselect event_timestamp, resource_type, operation_namefrom azure_activity_logwhere event_timestamp > CURRENT_DATE - INTERVAL '1 hour';
What recent IAM changes have been made?
Security Auditselect event_time, event_name, user_identity, resourcesfrom aws_cloudtrail_logwhere event_name like '%IAM%' and event_name like '%Update%'order by event_time desclimit 20;
Where are critical events originating from?
Geolocation Queriesselect tp_source_ip, service_name, resource, operation, metadatafrom gcp_audit_logwhere severity in ['Warning', 'Critical', 'Alert', 'Emergency'];
How It Works
Get started analyzing logs in <60sec.
Get inspired
Explore dozens of open source libraries and examples on the Tailpipe Hub.
Get started fast
Install Tailpipe & your favorite cloud service plugins locally.
$ brew install turbot/tap/tailpipe$ tailpipe plugin install aws...Installed plugin: aws@latest
Collect your logs
Tailpipe can collect logs directly to your local device from source APIs, object storage or network locations.
$ tailpipe collect aws_cloudtrail_log
Artifacts: Discovered: 20 Downloaded: 20 252MB
Rows: Received: 1,939,207 Saved: 1,859,713
Completed: 15s
Explore your log data
Understand the size and shape of your logs to get a feel where to start.
$ tailpipe query
> select count(*) from aws_cloudtrail_log;
+---------------+| count_star(*) |+---------------+| 12,558,449 |+---------------+
> .inspect aws_cloudtrail_log
...
Dig deeper with SQL
SQL eliminates friction between you and your data. Query, sort, group and filter using familiar SQL syntax.
select error_code, count(*) as event_countfrom aws_cloudtrail_logwhere error_code is not nullgroup by error_codeorder by event_count desc;
Detections as code with Powerpipe
Go even deeper with Powerpipe. Run (and learn from) existing industry benchmarks & MITRE ATT&CK detections then start building your own as code.
Collaborate
Organize your analysis into code repos to share what you are building with your teams and our growing community.
Demos
See Tailpipe in Action
select * from logs;
Open source SIEM for instant log insights, powered by DuckDB. Analyze millions of events in seconds, right from your terminal.
Dashboards for DevOps.
Visualize cloud configurations. Assess security posture against a massive library of benchmarks. Build custom dashboards with code.
select * from cloud;
Drill deep into the table schemas and discover helpful example queries for 140 plugins.
Workflow for DevOps.
Automate cloud operations. Coordinate people and pipelines. Build workflows as code.