Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Log Management, Log Analytics and related technologies.

When Should You Enable Trace-Level Logging?

There’s nothing like debugging a broken system at 2 AM, running on caffeine and frustration. When everything’s on fire, logs are your lifeline. That’s where trace-level logging comes in. Unlike standard logs, it captures the step-by-step execution of your code—think of it as the difference between a crime report and full CCTV footage. But more logs don’t always mean better debugging. Too much detail, and you’re drowning; too little, and you’re guessing.

Essential Steps for Troubleshooting Network Problems

Everyone has a story about that one road trip where traffic got backed up, making people late to the event. When you have network connectivity problems, your information highway gets clogged up, making it difficult for users to access resources efficiently. While network troubleshooting strategies may seem simple, a lot of nuance and complexity lies in the activities when you dig into your data.

Deployment Tracking with Mezmo Live Streaming Tail

You've deployed a new feature into production. You've done your unit testing, fixed lots of bugs, your code is awesome. Now it's time for hundreds/thousands/millions of users to break...err...use your feature. You're diligent about tracking usage in real-time, and getting customer feedback when something goes wrong. You track the performance and response time impacts on the server. All is good...except...that feature isn't quite working for a specific group of users. Now what?

Webinar: Petabyte Scale, Gigabyte Costs: Mezmo's ElasticSearch to Quickwit Evolution

Many engineering teams rely on ElasticSearch for search and analytics, but as data volumes grow, so do the challenges of scale, cost, and performance. At Mezmo, we faced this reality head-on, recognizing the need for a more efficient and scalable solution to support our multi-cluster, multi-petabyte telemetry data backend. After extensive evaluation, we made the leap to Quickwit, an open-source, cloud-native search engine for logs. But making such a fundamental architectural shift—without disrupting customers—was no small feat.
Sponsored Post

The Top 5 Security Logging Best Practices to Follow Now

Security logging is a critical part of modern cybersecurity, providing the foundation for detecting, analyzing, and responding to potential threats. As highlighted by OWASP, security logging and monitoring failures can lead to undetected security breaches. With the average cost of a data breach adding up to $4.45 million, most organizations can't afford to miss a security incident.

Introduction to Private Locations in Splunk Synthetic Monitoring

In this tutorial, we’ll demonstrate how to create and use private locations in Splunk Synthetic Monitoring to test internal or pre-production applications within a Kubernetes environment. You'll learn exactly what private locations and private runners are, common use cases, and step-by-step instructions on how to deploy a private runner using Helm. Finally, you'll see how to set up a simple browser test to run synthetics against a service available only within a Kubernetes cluster.

Troubleshoot microservice-based apps faster with Splunk Observability Cloud

When something goes wrong with your microservice-based apps, Splunk Observability Cloud offers a unified Observability platform to make debugging processes easier and faster. By using features like the Service Map to identify the cause of the error and Related Logs in Log Observer to pinpoint its location, you can get back up and running quickly, limiting the impact to your bottom line and keeping your customers happy.