Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Log Management, Log Analytics and related technologies.

Nailing ELK at Scale: A Real World Success Story from Holler

Ever use stickers or GIFs to make your texts, messages, or DMs more interesting? If yes, you’ve probably used Holler – a messaging tool that makes digital conversations come to life. The engineers at Holler have the daunting task of monitoring the performance and reliability of a service used by millions of people around the globe on a daily basis. Like many modern DevOps teams, they chose the ELK Stack to manage and analyze their log data. Hear from Daniel Seravalli, a Lead Engineer at Holler, on their story about grappling with the complexities of managing their ELK Stack at scale.

Are you paying too much for your logging solution?

The cost of logging is one of the big problems of a scaled software system. Logging solutions now need to support far more than they ever have. You need to make a real investment in a logging solution that can support these initiatives. However, the up-front costs of a custom-built logging solution are prohibitive for many organizations. No business wants its bottom line affected by logging costs. That’s where Coralogix comes in.

Debugging broken grok expressions in Elasticsearch ingest processors

In two previous posts, we covered structuring data with grok and building custom grok patterns. But what happens if you just can’t get your grok patterns to work? In this article, we’re going to use Kibana’s Grok Debugger to help us debug a broken grok pattern. The divide-and-conquer method described below should help you to quickly find the reason that a given grok pattern is not matching your data.

SIEM vs. SOAR: What's the Difference?

Cloud security is the combination of tools and procedures that form a defense against unauthorized data exposure by securing data, applications, and infrastructures across the cloud environment and by maintaining data integrity. To read more about the basic principles of cloud security, check out our previous article on the subject. Cloud security is a constant concern for R&D teams, and more and more methodologies are being introduced to help teams achieve their goals.

.NET Logging: Best Practices for your .NET Application

Logging is a key requirement of any production application. .NET Core offers support for outputting logs from your application. It delivers this capability through a middleware approach that makes use of the modular library design. Some of these libraries are already built and supported by Microsoft and can be installed via the NuGet package manager, but a third party or even custom extensions can also be used for your .NET logging.

Exclaimer: Shortening the lengths of incidents with Datadog

Hear how Matt Hodge from Exclaimer leverages Datadog Log Management to migrate away from a homegrown solution and find one platform to manage dev and ops logs. Through deep integrations with Microsoft Azure, Exclaimer is able to gain rapid visibility into their entire Azure-based infrastructure as well.

Announcing the Elastic Contributor Program

Open source contributions are foundational to Elastic — from Elasticsearch’s Apache Lucene core to the addition of open source Logstash and Kibana to form the Elastic Stack you’ve come to know and love. Over the years, the Elastic community has created over 90 Beats, shared use case tutorials like those from Volvo, T-Mobile, and Microsoft, and presented at hundreds upon hundreds of meetups.

Kubernetes Logging and Monitoring: What Kubernetes Can and Can't Do Natively

Kubernetes is a container orchestration tool, but its functionality extends far beyond just orchestrating containers in a narrow sense. It offers a range of additional features that—to a limited extent—address needs such as load balancing, access control, security policy enforcement, and even logging and monitoring. Indeed, Kubernetes’s broad functionality has led some folks to call it an “operating system” in its own right.