Operations | Monitoring | ITSM | DevOps | Cloud

Announcing record of remediation & audit logs in Puppet Remediate 1.3

Today we are pleased to announce the release of Puppet Remediate 1.3.0. This release includes new features requested by our customers, including even more capabilities to help you track and trace network activity, and give you more control of the data in your dashboard. Read on for background and a look at the new capabilities.

Optimize Ghost Blog Performance Including Rewriting Image Domains to a CDN

The Ghost blogging platform offers a lean and minimalist experience. And that's why we love it. But unfortunately sometimes, it can be too lean for our requirements. Web performance has become more important and relevant than ever, especially since Google started including it as a parameter in its SEO rankings. We make sure to optimize our websites as much as possible, offering the best possible user experience.

5 Best Tools to Tail Logs in 2020

Modern businesses rely on a complex ecosystem of digital networks, databases, applications, user devices, and more. The tools and platforms supporting this ecosystem undergo constant refinement and upgrades. However, the basic methods for monitoring infrastructure and application performance have remained unchanged, and logging is one such methods. Every computer, server, networking device, and application produces logs, a timestamped record of events within a system.

5 Best Tools to Tail Logs

Modern businesses rely on a complex ecosystem of digital networks, databases, applications, user devices, and more. The tools and platforms supporting this ecosystem undergo constant refinement and upgrades. However, the basic methods for monitoring infrastructure and application performance have remained unchanged, and logging is one such methods. Every computer, server, networking device, and application produces logs, a timestamped record of events within a system.

Real-time monitoring of Fastly metrics with the Elastic Stack and Haskell

The Stack Infra team at Elastic uses many services to provide downloads for projects like Elasticsearch and Kibana to our users. One of these services is Fastly, which helps us optimize delivery to regions around the world. Keeping an eye on the performance and behavior of our CDN is important to ensure we're operating at the level we expect.

Cost-Efficient Ways to Run DynamoDB Tables

As we all know, the on-demand capacity mode of DynamoDB is great but can be cost-prohibitive in some cases (up to seven times more expensive than the Provisioned Capacity mode). The Provisioned mode, on the other hand, shifts to the development team the burden of predicting what level of capacity will be required by the application. And it’s not quite as straightforward to achieve the same level of scalability in the Provisioned mode as we enjoy in the On-demand one.

Independent Survey Reveals: Continuous Intelligence Demand Grows as Organizations Shift to Real-time Business

As the shift to cloud, modern app architectures and technology stacks continue to accelerate, the demand for real-time analytics to monitor, troubleshoot, secure and speed new innovations to these environments is also accelerating. So, we're not surprised to see demand for continuous intelligence—what we define as: real-time analytics from a cloud-native platform, supporting multiple use cases—is also accelerating.

MySQL Log File Location

Logs are valuable. Logs generated by a major backend resource that provides clients with access to crucial data are more than just valuable; knowing where they are and being able to manage and understand the information that they contain can mean the difference between smooth, secure operation and degraded performance or even catastrophic failure for your application. MySQL Server produces a handful of basic logs.

Announcing Graylog Illuminate for Authentication

Graylog Illuminate for authentication is a brand new offering designed by our Enterprise Intelligence team. It eliminates the manual setup necessary to detect, monitor, and analyze authentication activities and issues across your IT infrastructure by providing pre-built Dashboards, Alerts, and data enrichment. Initially, Graylog Illuminate for Authentication will address Windows authentication issues and activities. We will release additional data sources in the coming weeks so stay tuned!