Log Monitoring vs Log Analysis: What's the Difference?
What is log monitoring and log analysis? Both are crucial parts of log management and related in many capacities, but by definition, the two actually have different core meanings.
What is log monitoring and log analysis? Both are crucial parts of log management and related in many capacities, but by definition, the two actually have different core meanings.
Sure, thousands of technologists around the world are using Prometheus and Grafana to monitor their business systems. But how about putting these technologies to work at home? Erwin de Keijzer, a Linux engineer at the Dutch consulting firm Snow, gave a talk at GrafanaCon EU about how he used Prometheus and Grafana to monitor the power usage… of his washing machine. “This is a talk that’s a bit different scale than we’ve heard so far” at GrafanaCon, he quipped.
Addressing compliance requirements for monitoring and logging can be a challenge for any organization no matter how experienced or skilled the people responsible are. Compliance requirements are often not well understood by technical teams and there is not much instruction on how to comply with a compliance program. In this article, we’ll discuss what some of these new compliance programs mean, why they are important, and how you can comply with your logging and monitoring system.
Honeycomb strives to be a fast, efficient tool; our storage back-end satisfies the median customer query in 250ms (and the P90 in 1.3 seconds). Still, every system has its limits, and customers with large datasets know that querying over a long time range, grouping by high-cardinality columns, building complex derived columns, and throwing a quantile or heat map into the mix can lead to some pretty slow queries. If this sounds familiar: good news!
The world is changing. The way we do business, the way we communicate, and the way we secure the entPuppet is a software configuration management and deployment tool that is available both as an open source tool and commercial software. It’s most commonly used on Linux and Windows to pull the strings on multiple application servers at once. It includes its own declarative language to describe system configurations.
All Things Open, a conference focused on open source technologies, was held in Raleigh, NC this week and was bursting at the seams with over 4,500 attendees. Grafana Labs’ own Tom Wilkie gave his RED Method: How to instrument your services talk to a standing-room only crowd. We were excited to speak at and sponsor ATO and look forward to next year.
The world is changing. The way we do business, the way we communicate, and the way we secure the enterprise are all vastly different today than they were 20 years ago. This natural evolution of technology innovation is powered by the cloud, which has not only freed teams from on-premises security infrastructure, but has also provided them with the resources and agility needed to automate mundane tasks.