Skip to content

POC

Full cost analysis against the log analyzer before any deploy. The POC runs with read-only credentials and processes events locally — events stay on the machine.

"cost POC on our Splunk"

Pulling ~250K-event sample. Returned snapshot_id=snap_abc123. ETA 2–3 min.

"show report snap_abc123"

Top driver: Payment_Gateway_Timeout $4.2K/wk in payments-svc → recommend Reducer cap at 5%. Projected savings $306K/yr across the stack. Full report at /tmp/log10x-reports/poc_from_siem-snap_abc123.md.

You ask Example answer
cost POC on our Splunk Pulls a representative ~250K-event sample from your log analyzer (Splunk / Datadog / Elasticsearch / CloudWatch / Sumo / Azure / GCP / ClickHouse) in 2–3 min. Returns a snapshot_id.
show report snap_abc123 A 9-section report: top patterns by cost, cost per service, projected savings, per-pattern recommendations, suggested filter configs.
cost POC from kubectl, namespace production, 1h Industry-pricing matrix built from a kubectl-sourced sample. Use when no log analyzer credentials are available yet. Sample-composition table calls out which pods dominate the bytes so the projection isn't trusted blind.

Prerequisites

Read-only credentials for your log analyzer for POC submit and POC status. Local POC needs kubectl on PATH instead. Privacy mode (default on every path) also needs the CLI installed locally (brew install log10x/tap/tenx).