Operations | Monitoring | ITSM | DevOps | Cloud

Logging

The latest News and Information on Log Management, Log Analytics and related technologies.

Continuous Data: The Complete Guide

Data is never just data. There are structured and unstructured data, qualitative and quantitative data. Among these varied types, continuous data stands out as a key player, especially in the quantitative realm. Continuous data, with its infinite possibilities and precision, captures the fluidity of the real world — from the microseconds of a website’s load time to the fluctuating bandwidth usage on a network.

What is an API Gateway

When people bemoan the complexity of interconnected IT environments, they usually mean that an organization has a lot of applications that all share data with each other. As your organization adds more applications, you need to make sure that they securely share data with each other. In short, security and development teams find themselves working to deploy and protect the Application Programming Interfaces (APIs) that enable applications to talk to each other.

5 Proactive Security Engineering Techniques for Cloud-Native Teams

Developing a proactive security strategy can potentially save an organization millions of dollars per year. According to IBM, the average cost of a data breach in 2023 added up to a staggering $4.45 million, up 15% over the last three years. This is especially true for cloud-native environments, which face unique security challenges due to their dynamic nature.

Microsoft Defender Endpoint Logs and Cribl Stream - Quick Start Guide

Microsoft Defender offers everyone comprehensive threat prevention, detection, and response capabilities—from individuals looking to protect their families to the world’s largest enterprises. Microsoft Defender allows IT and Security teams to prevent, detect, and respond to attacks across devices, identities, apps, email, data, workloads, and clouds. Have you ever wondered if you can use Cribl Stream to help manage your Microsoft Defender for Endpoint logs? The answer is Yes (plus benefits)!

Docker Logging: Effective Strategies for Docker Log Management

Docker is a platform that makes creating, deploying, and running containerized applications easier. Containerization is a lightweight and portable application deployment technique involving packaging an application and its dependencies inside a container. A container is a standalone, executable software package that includes everything needed to run a piece of software, including the code, runtime, system tools, libraries, and settings.

What happens when you can afford to ingest all your log data?

Sit down with Joe Kim, Sumo Logic's CEO, and Michael Cucchi, VP of Product Marketing, for a fireside chat (minus the fire) about Sumo Logic's new flex licensing plan. They'll discuss how removing the cost of ingesting log data across an enterprise: Tune in for a 20-minute chat about what happens when you can finally log everything with $0 ingest.

Introducing Honeybadger Insights

I'm pleased to announce a new feature that we've been building for over a year: Honeybadger Insights. Insights is our take on logging and performance monitoring, helping application developers gain deeper visibility into what's happening with their applications. It goes beyond application monitoring and responding to exceptions and downtime. Insights lets you drill down into the details and step back to see patterns in your data.

TCP/IP: What It Is & How It Works

Network protocols are necessary for data transmission and networking over different devices. One of the most common protocols is the TCP/IP framework, which builds connections through our internet. In fact, if you check email, watch Netflix, or stream music from Spotify, you’re relying on TCP/IP in the background. In this article, you’ll learn about the TCP/IP protocol layers and how they function.