Operations | Monitoring | ITSM | DevOps | Cloud

Logging

The latest News and Information on Log Management, Log Analytics and related technologies.

Cloud Repatriation Explained: Is Bringing Your Data Home the Right Move?

The cloud is the future — or is it? While statistics show that the public cloud continues to grow, a small but loud group is proudly going in the other direction. David Heinemeier Hansson, the CTO of 37signals — the company behind Basecamp and HEY, among others — recently posted his controversial take on the subject, announcing that the organization would be leaving the cloud.

Network Telemetry Explained: Frameworks, Applications &Standards

Imagine you have a network, whether it's a LAN or a vast enterprise-level network spread across different locations. Now, picture yourself wanting to monitor and analyze the data flow within that network. That's where network telemetry comes into play. Network telemetry is a group of techniques that allow you to understand better what's happening within networks. It's like watching the network's pulse to keep track of its health and performance.

Unearthing Gold: Deriving Metrics from Logs with Mezmo Telemetry Pipeline

Logs are like gold ore. They have valuable nuggets of information, but those nuggets often come in a matrix of less helpful material. Extracting the gold from the ore is crucial because it is vital to unlocking insights and optimizing your system(s). Raw logs can be overwhelming, containing informational messages, debug statements, errors, etc. However, buried within this sea of data lies the key metrics you can use to understand your applications' performance, availability, and health.

The hidden data challenges CIOs face on their quest to accelerate business outcomes

Navigating the complex terrain of IT systems, operational issues, and security breaches is no easy job, even for the seasoned CIO. And when tasked with the lofty goals of improving operational resilience, mitigating security risk, and enhancing customer experiences, dealing with the day-to-day operations is all the more challenging. Achieving these goals can often feel overwhelming, with no end to the journey in sight.

Understanding Amazon Security Lake: Enhancing Data Security in the Cloud

This year, Amazon Web Services (AWS), a leading cloud services provider, announced a comprehensive security solution called Amazon Security Lake. In this blog post, we will explore what Amazon Security Lake is, how it works, the benefits for organizations, and partners you can leverage alongside it to enhance security analytics and quickly respond to security events. Image source: Amazon.

OpenSearch Dashboards vs Kibana

In this guide, we will compare two of the leading data visualization tools based upon open-source software that are available for use for metrics, traces and log analysis. To allow new users to know exactly which solution may be best suited to their needs, we wanted to explore in more depth a comparison between OpenSearch Dashboards and Kibana across various aspects in our latest guide covering the differences between leading open-source software.

Unify Infrastructure and Application Observability with Logz.io's Service Overview

Logz.io is excited to announce Service Overview, a fast and easy way to unify telemetry data and insights across your infrastructure and applications into a single interface. Our Beta users have reported simplified observability, faster time-to-insights, and observability consolidation.

Logs vs Metrics: What Are They and How to Benefit From Them

In a rapidly evolving realm of IT, organizations are constantly seeking peak performance and dependability, leading them to rely on a reliable observability platform to obtain valuable system insights. Logs vs metrics play a vital role, as any full-stack observability guide would tell you, serving as essential elements for efficient system monitoring and troubleshooting. But what are logs and metrics, exactly?

Why Cyber Resilience Is Foundational to Your SIEM Success

The common failure scenarios that occur in the cybersecurity world are typically assumed to be costs of doing business, but they’re actually more predictable and avoidable than you might imagine. Even if you’ve been lucky enough to avoid failed data sources or backups, a SIEM getting knocked offline, and other cybersecurity attack situations until now — in today’s day and age, they’re still inevitable.