Operations | Monitoring | ITSM | DevOps | Cloud

Logging

The latest News and Information on Log Management, Log Analytics and related technologies.

Using Machine Data Analytics to Gain Advantage in the Analytics Economy

Sumo Logic commissioned 451 Research to conduct a research study to better understand the potential of machine data. Is machine data in fact an important source of fuel in the analytics economy? Do businesses recognize the role machine data can play in driving business intelligence? Are businesses that recognize the power of machine data leaders in their field?

Motadata: Correlate Integrate Analyze your IT Infrastructure Stack

Motadata platform is built for every member of your IT team to monitor, track and deliver great business services. Upgrade your existing monitoring tools with one unified analytics platform for performance monitoring, network behavior analytics, log management and SIEM. To provide uninterrupted services to the users, operational team need correlated data, integrations across the board to collect & automate, analytics capabilities to monitor & visualize critical metrics which allows making more informed decisions. Motadata platform can help you do just that – Correlate, Integrate and Analyze IT infrastructure stack.

Back to Basics: Working with Linux Audit Daemon Log File

If you run the audit daemon on your Linux distribution you might notice that some of the most valuable information produced by auditd is not transmitted when you enable syslog forwarding to Graylog. By default, these messages are written to /var/log/audt/audit.log, which is written to file by the auditd process directly and not sent via syslog.

Sumo Logic's State of the Modern App in the Cloud Report 2017

Sumo Logic's ‘State of Modern Applications in the Cloud’ report provides exclusive data-driven insights, best practices and emerging trends by analyzing technology adoption within the application stack. Key findings surround adoption of Linux in Azure, growth of serverless computing and containers; and a cloud security paradox.