Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Log Management, Log Analytics and related technologies.

observIQ Expands Advanced Support for Sumo Logic in Security and Observability Data

We’re excited to announce that as part of our expanded alliance with Sumo Logic, observIQ extended its support for Sumo’s platform. This allows customers to send logs and metrics to Sumo Logic, leveraging our telemetry pipeline, BindPlane. We’ve also made it possible to automatically recommend processors in our pipeline that format data specifically as Sumo Logic expects—once Sumo Logic is a destination for BindPlane.

How the Cribl SRE Team Uses Cribl Products to Achieve Scalable Observability

This is the first of a planned series of blog posts that explain how the Cribl SRE team builds, optimizes, and operates a robust Observability suite using Cribl’s products, Cribl.Cloud operates on a single-tenant architecture, providing each customer with dedicated AWS accounts furnished with ready-to-use Cribl products. This provides our customers with strict data and workload isolation but presents some interesting and unique challenges for our Infrastructure and operations.

How to Start Contributing to Open Source with OpenTelemetry

Today, open source software is everywhere – from Linux-based servers, to Android smartphones, to the Firefox Web browser, to name just a handful of open source platforms in widespread use today. But the open source code driving these innovations doesn't write itself. It's developed by open source contributors – and you could be one of them.

Introduction to K8s Horizontal Pod Autoscaling | Monitor Autoscaling in Splunk Observability Cloud

In this video, I’m going to introduce you to Horizontal Pod Autoscaling in Kubernetes and monitoring autoscaling events in Splunk Observability Cloud. I’ll first walk through our simple application deployment definition. We will analyze the metrics of that application in Splunk Observability cloud, identifying that the application is under resource pressure. I’ll then discuss the scaling options at our disposal, and we will walk through an implementation of a Horizontal Pod Autoscaler that will automatically scale our pods according to the load they are receiving.

What is Log Aggregation? A Complete Guide

As modern IT infrastructure becomes increasingly complex, businesses generate massive amounts of logs compared to the past in real time. Therefore, streamlining this unstructured log data into a more structured form becomes vital with this growing complexity. Organizations must collect unstructured log data from various sources, extract meaning from them, and store them in a centralized repository. That’s where Log Aggregation comes in.

Dogfooding at Mezmo: How we used telemetry pipeline to reduce data volume

Like many other organizations, we at Mezmo struggle with a lot of telemetry data, and for a while our team configured our logs to be sent to a global Mezmo Log Analysis account in our SaaS so we would have a single pane of glass to view all of our logs. Our SRE team wanted to make sure that we have experience utilizing our new pipeline product. We set out some goals before we started using telemetry pipeline.

Best Windows Server Monitoring Tools

Server monitoring involves continuously observing and tracking the performance, availability, and health of servers within an IT infrastructure and is a vital process for organizations aiming to enhance their servers. By conducting server monitoring, with the assistance of server monitoring tools, your organization can detect issues such as hardware failures or software glitches promptly allowing for quick resolutions as server monitoring tools continuously track server health and performance metrics.

Event Logs Explained: Your Guide to System Health

Event logs contain critical information and the analysis of these logs will support organizations in the detection of many security incidents, from auditing user access to observing malicious traffic and even isolating monitor rule changes on a firewall. By collecting event logs systematically and analyzing them, organizations can obtain insights into their IT environment for maintaining operational efficiency and security.