The latest News and Information on Log Management, Log Analytics and related technologies.
Kubernetes has become the de-facto industry standard for container orchestration. It provides the required abstraction for efficiently managing large-scale containerized applications with declarative configurations, an easy deployment mechanism, and both scaling and self-healing capabilities.
The cost of logging is one of the big problems of a scaled software system. Logging solutions now need to support far more than they ever have. You need to make a real investment in a logging solution that can support these initiatives. However, the up-front costs of a custom-built logging solution are prohibitive for many organizations. No business wants its bottom line affected by logging costs. That’s where Coralogix comes in.
In two previous posts, we covered structuring data with grok and building custom grok patterns. But what happens if you just can’t get your grok patterns to work? In this article, we’re going to use Kibana’s Grok Debugger to help us debug a broken grok pattern. The divide-and-conquer method described below should help you to quickly find the reason that a given grok pattern is not matching your data.
What’s the buzz around AIOps? According to Gartner, “AIOps is the application of machine learning (ML) and data science to IT operations problems.” Though the terms AI and ML conjure images of almost magical capabilities, devoid of connection to the domain in which it’s applied, actually the reality is far different.
Cloud security is the combination of tools and procedures that form a defense against unauthorized data exposure by securing data, applications, and infrastructures across the cloud environment and by maintaining data integrity. To read more about the basic principles of cloud security, check out our previous article on the subject. Cloud security is a constant concern for R&D teams, and more and more methodologies are being introduced to help teams achieve their goals.
Logging is a key requirement of any production application. .NET Core offers support for outputting logs from your application. It delivers this capability through a middleware approach that makes use of the modular library design. Some of these libraries are already built and supported by Microsoft and can be installed via the NuGet package manager, but a third party or even custom extensions can also be used for your .NET logging.
Open source contributions are foundational to Elastic — from Elasticsearch’s Apache Lucene core to the addition of open source Logstash and Kibana to form the Elastic Stack you’ve come to know and love. Over the years, the Elastic community has created over 90 Beats, shared use case tutorials like those from Volvo, T-Mobile, and Microsoft, and presented at hundreds upon hundreds of meetups.
Kubernetes is a container orchestration tool, but its functionality extends far beyond just orchestrating containers in a narrow sense. It offers a range of additional features that—to a limited extent—address needs such as load balancing, access control, security policy enforcement, and even logging and monitoring. Indeed, Kubernetes’s broad functionality has led some folks to call it an “operating system” in its own right.