Operations | Monitoring | ITSM | DevOps | Cloud

Logging

The latest News and Information on Log Management, Log Analytics and related technologies.

Keep Your Company Safe: The ARRR Pillars - SolarWinds Lab Episode #64

In this episode, Head Geeks explain the ARRR Pillars (Availability, Reliability, Resiliency, and Recoverability) and how applying them in practice can help keep your company safe. We'll cover patch reporting and analytics, cloud logging best practices, and disaster recovery using backup best practices.

DevSecOps and Log Analysis: Improving Application Security

As time goes on, more and more organizations are abandoning the outdated waterfall development methodology for more practical and efficient Agile development practices. As this movement has occurred, development teams are moving faster than ever by employing Continuous Integration (CI) and Continuous Deployment (CD) practices that are serving to shorten development cycles and get new features into production with increasing speed.

Best Practices for Kubernetes & Container Logging | Continuous Delivery & DevOps

Logs can be one of the most effective tools for engineers and DevOps. In this webinar LogDNA CTO Lee Liu will demonstrate best practices with container logging, how to make sense of them and setup effective alerts to raise problems before they spin out of control.

Machine Data Analytics for AWS Services

The AWS Cloud is no longer the future of information technology infrastructure, but rather a present day reality. As data growth continues to expand, organizations around the world are avoiding building, and in some cases, actively closing down, on-premises datacenters as paying for the total cost of ownership for such environments is becoming an unwieldy, or at the very least inefficient, use of capital. This trend can be observed with the increasingly rapid adoption of cloud services over recent years.

Monitoring (with) Elasticsearch: A few more circles of hell

This is the second part of our two-part article series devoted to Elasticsearch monitoring. The heading of this article refers to Dante Alighieri’s “Inferno”, in which Dante offers a tour through the nine increasingly terrifying levels of hell. Our journey into Elasticsearch monitoring was also filled with hardships, but we have overcome them and found solutions for each case.

The Value of Threat Intelligence Automation

The news is full of stories about the talent shortage in IT, especially in IT security. This shortage has created pressure on organizations to grow IT operations and to do that securely, all while having too few staff. Many are turning to threat intelligence to give their security analysts the tools they need to evaluate threats quickly and effectively. Essentially offering “Intelligence as a Service,” these tools enable organizations to benefit from the research of others.