Operations | Monitoring | ITSM | DevOps | Cloud

logz.io

The Tool Sprawl Problem in Monitoring

One of the biggest KPIs in the DevOps space is monitoring. There are so many tools to help any organization to complete their monitoring picture, but no tool does everything and most organizations use many tools to help complete their monitoring solution. Mashing tools together often creates a problem of its own — the tool sprawl problem.

The Evolution of CI/CD and Agile

It’s nearly the end of 2018 and we still discuss CI/CD and agile as separate concepts. The truth is, the line between them is blurring. Doing either or both well is very difficult. In fact, many organizations struggle to effectively execute an agile workflow, or reach CD because they are so difficult to do well. This article focuses on why it is so important to keep striving toward this gold standard duo because CI/CD and agile result in quality and predictability.

What's New in Elastic Stack 6.5

Elastic Stack 6.5 is out! Every new version of the Elastic Stack is packed with new features and updates, and as always, I’m happy to dive a bit deeper into the new release to provide our readers with a wrap up of what’s new. Interestingly enough, and as reflected in the announcements surrounding this release, this release is all about Kibana. That’s not to say the other components in the stack were left out – to the contrary, and I will cover them all, don’t you worry.

Finally, Kibana and Grafana Together Like They were Always Meant to Be

Let’s face it, Kibana and Grafana were naturally meant to go together, right? They’re both great individually, but sparks really start to fly when they work together! Each has their own strengths but combined they cover all the monitoring and troubleshooting use cases you need. So what is keeping these two highly compatible technologies apart? Nothing. Anymore.

A re:Invent to Remember-What to Expect at AWS re:Invent 2018

Every year, we take time out of our everyday activities to join thousands of techies just like us for the biggest event of the season–AWS re:Invent. For one week at the end of November, industry leaders gather in Las Vegas to learn about new technologies from AWS as well as other partners in the cloud, DevOps, and IT spaces. The new technology, innovative ideas, and smart, ambitious people we have met over the past few years have been priceless for all of us at Logz.io.

Logz.io - Who We Are and What We Do

Logz.io is an intelligent log analytics platform that combines the popular ELK stack as a cloud service and sophisticated machine learning. Logz.io derives insights from machine data, user behavior and community knowledge in a scalable, production-ready platform that enables organizations to resolve issues faster and take operations to the next level.

Setting Up Application Performance Monitoring with the ELK Stack and Logz.io

Application Performance Monitoring, aka APM, is one of the most common methods used by engineers today to measure the availability, response times and behavior of applications and services. There are a variety of APM solutions in the market but if you’re familiar with the ELK Stack or are a Logz.io user, this article describes using a relatively new open source-based solution — Elastic APM.

AWS GuardDuty Monitoring with Logz.io Security Analytics and the ELK Stack

Last month, we announced Logz.io Security Analytics — a security app built on top of the ELK Stack, offering out-of-the-box security features such as threat intelligence, correlation, and premade integrations and dashboards. In this article, I’d like to show an example of using both the ELK Stack and Logz.io Security Analytics to secure an AWS environment.

Advanced Mitigation Techniques to Stop DDoS Attacks in Their Tracks

In our last blog post, we learned what the Distributed Denial of Service (DDoS) attack is, and examined the DDoS picture globally. As we walked through some recent and well-known cases, we also surveyed a range of attack types and drilled down to specific examples. In this article, we’ll study the mitigation techniques you’ll need to resist these attacks. You’ll learn: 1. How to avoid becoming a bot; 2. How to prepare your own network for the possibility of an attack and finally; 3.