Operations | Monitoring | ITSM | DevOps | Cloud

Logging

The latest News and Information on Log Management, Log Analytics and related technologies.

Garbage Collection Settings for Elasticsearch Master Nodes

Elasticsearch comes with good out-of-the-box Garbage Collection settings. So good in fact that the Definitive Guide recommends not changing them. While we agree that most use-cases wouldn’t benefit from GC tuning, especially when it turns out there simply isn’t enough heap, there are exceptions. We found that G1 GC, for example, works well on big heaps. This allows you to have less, bigger nodes, which in turn means less network traffic in a large cluster.

Sumo Logic Announces Search Templates to Improve the Customer Experience with Better, Faster Application Insights

Providing the ultimate customer experience is the goal of every modern company, and to do that they need complete visibility into every aspect of their business. At Sumo Logic, we make it our mission to democratize machine data and make it available for everyone, which allows organizations to gain the required visibility at each step. That’s why today, we are excited to announce the availability of Search Templates to our customers.

Distributed Tracing with Zipkin and ELK

While logs can tell us whether a specific request failed to execute or not and metrics can help us monitor how many times this request failed and how long the failed request took, traces help us debug the reason why the request failed, or took so long to execute by breaking up the execution flow and dissecting it into smaller events.

Container Logging & DevOps: The Future of Kubernetes Integration

With the transition to containers and Kubernetes well underway the need to view and monitor your application performance has never been greater. There are several different ways to implement a logging solution within a container based infrastructure. From security and compliance to on-prem vs hybrid there are many important factors to consider when you build out your logging infrastructure.

GDPR: Top 5 Logging Best Practices

The rather broad definition of personal data in the GDPR requires paying special attention to log data. GDPR and personal data in web server logs is a popular topic in many GDPR fora. For example, IP addresses or cookies might be considered personal data. Consequently, such data must be stored only with the consent of customers for a limited time. It is highly recommended to anonymize personal data before you hand over the logs to any 3rd party to minimize risk.

Integrating Threat Intelligence with Graylog

In my last post, I gave a high-level overview how to select a threat intelligence vendor and how to integrate indicators of compromise (IOCs) into your SIEM or log management environment. In this post, I will describe in detail how to use the Threat Intelligence plugin that ships with Graylog. I’ll start with the steps necessary to prepare your data, then explain how to activate the feature and how to configure it for use.

Insights Everywhere-Gaining More Value From Cloud and Hybrid

Got your infrastructures up in the cloud and elsewhere? As companies begin to deploy cloud infrastructures alongside their existing ones, their data is now scattered across a multitude of cloud and hybrid environments. However, it's possible to derive actionable insights from all your data in one place, if you use the right solution.

Why Machine Data is the Retail Industry's Best Kept Secret

As more customers are looking for a high-tech and seamless customer experience online, the fight to survive in the retail industry has become fierce. Forward-thinking retailers are beginning to leverage machine data generated by their customers to gain greater insights into customer buying journeys and provide their customers with a seamless digital experience.