Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Time Zones: A Logger's Worst Nightmare

When working with log messages, it’s critical that the timestamp of the log message is accurate. Incorrect timestamps can cause problems when trying to find log messages at a specific date/time or may cause alerts to not function properly. A common cause of incorrect timestamps for log messages is a mismatch of time zones between the log source (device sending the log) and log destination (device receiving the log, such as Graylog).

Efficient Help Desk Processes with Centralized Log Management

Another day starting up your laptop or workstation, logging into programs, and waiting for that first call to come in. As an IT help desk analyst, you love when you can solve people’s problems, but sometimes the number of calls feels overwhelming. Although each analyst tier responds to different customer or employee concerns, you all share the same basic job functions like answering calls, asking questions, and research answers.

Metrics For Investigating Network Performance Issues

When the world went remote in March 2020, cloud technologies made work possible. Rapid digital transformation changed everyone’s jobs, whether in-office, remote, or hybrid. Today, your business relies on network speed for everything from productivity to customer service. Keeping your company’s services running means you need to make sure you have low-latency connectivity across data centers, users, and cloud.

Why Observability Is Important for IT Ops

Everyday when you come into work, you’re bombarded with a constant stream of problems. From service desk calls to network performance monitoring, you’re busy from the moment you login until the moment you click the “shut down” option on your device. Even more frustrating, your IT environment consists of an ever-expanding set of network segments, applications, devices, users, and databases across on-premises and cloud locations.

What You Need to Know About Log Management Architecture

You’ve made the decision to implement a centralized log management solution because you know that it’s going to save you time and money in the long term. However, to get the most bang for your log management buck, you need to understand how the different parts of your log management deployment work. Once you understand each resource, you can implement a more efficient log management architecture.

Graylog 5.0 - A New Day for IT & SecOps

We are excited to announce the release of Graylog 5.0! Graylog 5.0 brings updates across our entire product line, including changes to infrastructure, Security, Operations, and our Open offerings. For more detailed information on what’s changed, visit our changelog pages for Graylog Open and Graylog Operations/Graylog Security.

Why Centralized Log Management? Understanding the Use Cases

Centralized log management provides various benefits across an organization. The fundamentals of log management offer a wide variety of business use cases. Whether you’re managing event log data manually or realizing you need more than an Open Source solution, finding the right internal champions can make your life easier. Understanding the business use cases and strategic impact centralized log management provides can help you gain the internal buy-in you need.

Centralizing Log Data to Solve Tool Proliferation Chaos

As companies evolve and grow, so do the number of applications, databases, devices, cloud locations, and users. Often, this comes from teams adding tools instead of replacing them. As security teams solve individual problems, this tool adoption leads to disorganization, digital chaos, data silos, and information overload. Even worse, it means organizations have no way to correlate data confidently. By centralizing log data, you can overcome the data silos that tool proliferation creates.

Centralized Log Management for Network Monitoring

It’s been a long few years for your IT department. In the span of one month, you had to make sure that all employees and contractors could work remotely. This meant giving everyone access to all cloud resources and ensuring uptime. Then, you needed to start securing access. Now, you need to shore up all your security as the phrase “zero trust architecture” has recently entered conversations with leadership.