Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Log Management, Log Analytics and related technologies.

Elastic's Guide to Data Visualization in Kibana

Practitioners the field of data visualizations often talk about 2 types of visualizations: exploratory vs explanatory. To quote Google definitions, “Exploratory data visualizations (EDVs) are the type of visualizations you assemble when you do not have a clue about what information lies within your data. Nov 19, 2018” Explanatory visualization, by contrast, is defined as “what happens when you have something specific you want to show an audience” (Storytelling with data blog, April 2014)

DevOps Best Practices for CI CD and Observability

Modern DevOps engineers are responsible for both running production and quickly responding to any production issues. To do this, they need to streamline their CI/CD pipeline and be equipped to quickly identify and investigate problems in production. In this webinar, we’ll hear from Mike and Sam from Logz.io and CircleCI, respectively, on how CircleCI and Logz.io can work together to simplify and accelerate application delivery and response to production issues.

Mitigate Logging Costs While Maintaining Full Observability with Logz.io

Considering the scale of log data that modern cloud environments generate, it’s oftentimes prohibitively expensive to index all of it. For monitoring and logging, cost management is just as important as in other parts of the business. Whether sudden spikes of log data overwhelm databases or good business generates more activity in your environment, teams should anticipate and mitigate the steep costs that result from high log volumes.

How to implement Prometheus long-term storage using Elasticsearch

Prometheus plays a significant role in the observability area. An increasing number of applications use Prometheus exporters to expose performance and monitoring data, which is later scraped by a Prometheus server. However, when it comes to storage, Prometheus faces some limitations in its scalability and durability since its local storage is limited by single nodes.

Profiling "VIP Accounts" Part 1

Detecting malicious activity is rarely easy, but some attacker methods are more challenging to detect than others. One of the most vexing techniques to counter is credential theft. Attackers that gain control over a user account have access to the assets of that user. If the credentials are for an account with special privileges, like a system administrator, then the attacker may be able to gain access to system-wide resources and even be able to change logs to cover their tracks.

Elastic Stack 7.7.0 released

We are pleased to announce the general availability of version 7.7 of the Elastic Stack. Like most Elastic Stack releases, 7.7 packs quite a punch. But more than the new features, we’re most proud of the team that delivered it. A feature-packed release like this is special during normal times. But it’s extra special today given the uncertain times we are in right now.

Elastic Stack Alerting Overview

Introducing the new alerting framework for the Elastic Stack bringing alert functionality directly into SIEM, APM, Uptime, and Metrics. The new alerting framework is built from the ground up and designed to offer data-driven triggers that let you do everything from send an email, to automatic Slack notifications, to even integrate with platforms like PagerDuty to initiate escalations.