call518/LogSentinelAI

Declarative LLM-powered analyzer for security events and all types of logs. Extracts, structures, and visualizes data for Kibana/Elasticsearch.

58
/ 100
Established

LogSentinelAI helps cybersecurity and operations teams transform messy, unstructured log data from systems like Apache or Linux into clear, structured security intelligence. You provide your raw logs and define the output structure you need, and it uses AI to extract and organize critical information, delivering it as structured JSON ready for tools like Kibana/Elasticsearch. This is for security analysts, SecOps engineers, and DevSecOps professionals who need to quickly identify threats and anomalies.

Available on PyPI.

Use this if you need to automate the analysis of security events, errors, or anomalies from various log types to improve threat detection and security monitoring without writing complex parsing rules.

Not ideal if you primarily need to analyze non-security related logs or require a solution that doesn't integrate with Elasticsearch/Kibana.

cybersecurity threat-detection log-analysis security-monitoring DevSecOps
Maintenance 10 / 25
Adoption 7 / 25
Maturity 24 / 25
Community 17 / 25

How are scores calculated?

Stars

35

Forks

8

Language

Python

License

MIT

Last pushed

Mar 12, 2026

Commits (30d)

0

Dependencies

31

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/llm-tools/call518/LogSentinelAI"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.