Operations | Monitoring | ITSM | DevOps | Cloud

February 2025

What is Apache? In-depth overview of Apache web server

The Apache HTTP Server, commonly known as Apache is a free and open-source web server, that delivers web content through the internet. As open-source software, its original source code is freely available for developers to view and collaborate. This has made Apache a favorite among developers who create and configure Apache models to expand its functionality and improve on its core features.

Tomcat Logs: Locations, Types, Configuration, and Best Practices

Apache Tomcat logs are essential for monitoring, debugging, and maintaining Java applications running on Tomcat. These logs capture critical information such as server startup details, request handling, and application errors. They help developers and system administrators troubleshoot issues, analyze traffic, and ensure application stability. Tomcat generates multiple logs, each serving a distinct purpose.

Eliminate log sprawl and cut costs with Sumo Logic

How much money is your company wasting on using multiple tools for log ingestion? Security analysts, developers, and operations teams all rely on logs. But, when each team uses different and multiple tools to store and analyze logs, it leads to tool sprawl, wasted resources, and lost critical data. With Sumo Logic’s Log Analytics Platform, you get a single source of truth for all your log data. Gain context-driven insights into your performance, availability, security status, and threats, all while eliminating wasteful spending.

What is Time Series Data?

Time series data is particularly prevalent, seen across numerous different industries and use cases. It offers significant value to various organizations, highlighting the importance of effectively monitoring and analyzing the data. By analyzing and monitoring time series data you can understand trends, patterns, and anomalies in sequential data collected at many points in time.

Understanding Syslog Formats: A Quick and Easy Guide

Syslog is the backbone of logging in many Linux and Unix-based systems, playing a crucial role in monitoring, debugging, and auditing. But not all syslog messages are created equal. Depending on your system, software, and logging configuration, syslog messages may follow different formats. This guide walks you through the different syslog formats, why they matter, and how to work with them effectively.

Log Retention: Policies, Best Practices & Tools (With Examples)

Logs are the backbone of debugging, security, compliance, and performance monitoring. But if you don’t manage retention properly, you’ll either drown in unnecessary data or lose critical insights too soon. Log retention is all about striking a balance between keeping what’s necessary and discarding what’s not.

Logging vs. Metrics

When discussing observability, the “big 3” - logs, metrics, and traces, come to mind. But for some, the less they have to implement, the better. Our lead engineer, JJ, had some advice to share about how logs may not be necessary for everyone. Simplifying your stack isn’t difficult - you just need to be intentional with implementation. Check out more MetricFire blog posts below, and our hosted Graphite service! Get a free trial and start using MetricFire now!

Grafana Loki 3.4: Standardized storage config, sizing guidance, and Promtail merging into Alloy

The Grafana Loki 3.4 release is here, and it brings a fresh wave of enhancements aimed at standardizing Loki’s object storage, helping you right size your instance, and improving the ability to ingest out-of-order logs. Loki 3.4 also represents the official merging of Promtail into Grafana Alloy as part of our efforts to give our users a single telemetry collector. There’s a lot to go over, so let’s dive in.

The Advanced Data Compression Techniques That Quietly Power Logz.io's AI Observability Agents

As an observability leader, at Logz.io, we pride ourselves on continuous innovation. That’s why, last year, we released our AI agents to revolutionize observability by helping businesses, and their engineering and DevOps teams, automate data analysis and root cause analysis. The primary way in which engineering and DevOps teams interact with the agents is by asking performance, troubleshooting, and optimization-related questions.

How to Filter Docker Logs with Grep

Managing logs in Docker can quickly become overwhelming, especially when dealing with multiple containers. If you’ve ever tried to sift through a sea of log entries looking for a specific error or debugging message, you know the struggle. Fortunately, you can pipe docker logs output through grep to filter logs efficiently. This guide breaks down how to use docker logs grep it effectively, including practical examples to help you debug and monitor your containerized applications like a pro.

Ubuntu System Logs: How to Find and Use Them

System logs play a crucial role in debugging and monitoring in Ubuntu. When a service misbehaves or an unexpected crash happens, logs hold the answers. They’re also great for keeping an eye on system performance. Knowing how to access, read, and manage these logs can save you hours of troubleshooting. This guide covers everything you need to know about Ubuntu system logs—from where they’re stored to how to analyze them efficiently.

Logz.io Open 360 Platform Overview

Welcome to Logz.io, where we make monitoring, troubleshooting, and optimizing your systems easier than ever. Our AI-driven observability platform helps you: Ingest and manage your logs effortlessly Analyze and visualize data with powerful filtering & alerting Pinpoint root causes instantly with AI-powered RCA Optimize observability costs with DataHub Ensure peak system performance with Kubernetes 360 & App 360.

Log Levels: Answers to the Most Common Questions

Logging is essential for understanding what’s happening inside your software. It helps developers and operators catch issues, monitor system health, and track application behavior. A big part of logging is log levels—these indicate how serious a message is, from routine updates to critical errors. In this post, we’ll break down everything you need to know about log levels, how they compare to Syslog log levels, and best practices for making the most of your logs.

Role-based Access Control: Scaling Access Control for Enterprise Needs

Role-Based Access Control (RBAC) is the backbone of secure system design, offering a structured method to manage user permissions and reduce the risks associated with overprivileged access. For large enterprise systems, RBAC is essential to ensure compliance, maintain operational integrity, and enable fine-grained access control across multiple teams and projects.

Coralogix Releases eBPF Observability for K8s Workloads

There are several big barriers to an effective tracing strategy. Modern applications require complex code instrumentation, and legacy applications might not be so easy to alter, and that’s assuming every engineering team can be engaged to make the necessary changes. eBPF & OpenTelemetry flip this entire problem on its head, and Coralogix is one of the first major observability platforms to leverage this exciting functionality, to provide an unobtrusive, low risk overview of your system.

Managed OpenSearch: Pricing and How Logit.io is the Best Value

If you’re considering OpenSearch for your search and analytics infrastructure, the first question that likely comes to mind is: what will it cost? OpenSearch, the powerful, open-source search engine and analytics platform, provides a highly scalable solution for businesses. However, while the software itself is free to use, there are still costs associated with hosting, maintaining, and scaling OpenSearch clusters.

Access your data with Federated Analytics for Amazon Security Lake. Insights from Splunk, AWS, and A

Federated Analytics gives organizations the full power of Splunk extended to data stored in Amazon Security Lake. Trusted partners like Accenture are helping bring these new capabilities to life at organizations around the world.

Elastic Cloud Serverless now available in technical preview on Microsoft Azure

Elastic Cloud Serverless provides the fastest way to start and scale security, observability, and search solutions — without managing infrastructure. Today, we are excited to announce the technical preview of Elastic Cloud Serverless on Microsoft Azure — now available in the EastUS region. Elastic Cloud Serverless provides the fastest way to start and scale security, observability, and search solutions without managing infrastructure.

How Storytelling Led Me to Observo AI

I have spent a 30-year career in marketing honing the art of storytelling. My career started in consulting, wound its way around to internet and software start-ups and had a 15-year stint at IBM in various roles before diving back into the world of start-ups again. That journey was made possible by telling stories about customers' challenges and how good life looks when our solutions solve them.

Latest Product Updates and Features in Logz.io | February 2025

We’re excited to announce a series of upgrades to our AI Agent, Log Management Explore UI and core integrations designed to empower you with even deeper observability and streamlined operations. These updates enhance account visibility, multi-telemetry trace insights, and logging capabilities while ensuring seamless compatibility with OpenTelemetry. Read on to discover how these enhancements can help you gain more clarity and control over your environment.

Beyond monitoring: The power of observability

The demand for seamless user experiences and robust system reliability is at an all-time high, and businesses are racing to meet these expectations. But as system complexity increases, traditional monitoring tools are falling short. Observability offers a paradigm shift. It goes beyond tracking metrics and provides deep insights to understand the “why” behind system behavior by parsing and contextualizing unstructured data.

How to Monitor Error Logs in Real-Time: An In-Depth Guide

For system admins and developers, being able to track error logs in real time is crucial. It’s not just about fixing problems; it’s about keeping everything running smoothly, ensuring systems perform at their best, and catching issues before they snowball into bigger ones. This guide breaks down the tools and commands that make real-time log monitoring easier and more effective, offering more than just the basics.

NGINX Log Monitoring: What It Is, How to Get Started, and Fix Issues

Ensuring that your web applications run smoothly and securely is essential. NGINX, known for its high performance and scalability, plays a key role in delivering web content. But to keep everything running efficiently, you need to monitor and analyze its logs properly. This guide will walk you through how to configure, analyze, and make the most of NGINX logs to stay on top of your server’s health.

Generation AI (Episode 3): How Generative AI is Shaping the Future of Customer Support

The next golden age of artificial intelligence has arrived, but the path forward is far from certain. Technology leaders are presented with a tremendous opportunity to revolutionize their business — that is, if they can find a way to tap into the full potential of their organization's data. In Episode 3 of Elastic's new limited series, Generation AI, Elastic's VP of Global Customer Support, Julie Rudd, shares how she believes generative AI will shape the future of customer support.

Generation AI (Episode 2): How Generative AI is Shaping the Future of Security Operations

The next golden age of artificial intelligence has arrived, but the path forward is far from certain. Technology leaders are presented with a tremendous opportunity to revolutionize their business — that is, if they can find a way to tap into the full potential of their organization's data. In Episode 2 of Elastic's new limited series, Generation AI, Elastic's CISO, Mandy Andress, shares how she believes generative AI will shape the future of the security operations in the modern enterprise.

Generation AI (Episode 1): How Generative AI is Shaping the Future of Enterprises

The next golden age of artificial intelligence has arrived, but the path forward is far from certain. Technology leaders are presented with a tremendous opportunity to revolutionize their business — that is, if they can find a way to tap into the full potential of their organization's data. In Episode 1 of Elastic's new limited series, Generation AI, Elastic's CIO, Matt Minetola, shares how he believes generative AI will shape the future of the modern enterprise.

Real User Monitoring for B2B vs. B2C Businesses

Imagine you’re a product manager at a B2B SaaS company. Monday morning, a frustrated client floods your inbox—their workflows were disrupted by a slowdown you could’ve caught sooner with better user insights. Now, imagine running an e-commerce store on Cyber Monday. Traffic surges, but abandoned carts spike. Your RUM dashboard reveals slow mobile checkouts. A quick fix saves thousands in sales.

The Role of Log Monitoring in Securing Hybrid Cloud Infrastructures

Hybrid cloud services have become a cornerstone for many businesses. These technologies, which combine the strengths of private and public clouds, assist enterprises in achieving their dreams of scalability, flexibility, and cost-efficiency. However, this added optimization comes at a cost, particularly with increased operational complexity and security concerns. To minimize cyber threats and secure their data, businesses must invest in more security solutions, such as log monitoring.

Full Guide to Linux Disk IO Monitoring, Alerting and Tuning

Disk IO (Input/Output) is a core aspect of system performance. Whether you’re managing a database, a web application, or a cloud server, how efficiently your system reads and writes data affects everything from response times to stability. Unlike high CPU usage or memory bottlenecks that often manifest immediately, disk IO issues tend to creep up silently—until they slow down critical processes.

How to Stop Memory Leaks Before they Crash Your Linux System

Imagine you’ve got a leaky faucet in your kitchen. At first, it’s just a drip here and there—annoying, sure, but not enough to ruin your day. But leave it unchecked, and soon that drip turns into a steady trickle. Your water bill skyrockets, the sink overflows, and before you know it, you’re ankle-deep in chaos. Now, replace that faucet with a Linux system, and you’ve got a memory leak.

5 Ways to Prevent CPU Overload on Linux Servers

Every server administrator’s nightmare starts with a message: “CPU usage at 100%” It’s that critical moment when your Linux server transforms from a reliable workhorse into a sluggish mess, taking your applications and user experience down. We’ve all been there… staring at a terminal, watching load averages climb, while frantically trying to figure out which process decided to throw a CPU-hungry party on our server.

Partnering for Success: Why a Strong Partner Ecosystem is Critical in Enterprise Security

Over my 20+ year career in enterprise technology, I've witnessed firsthand how powerful partner ecosystems can transform businesses. I've seen patterns repeat themselves time and time again: companies that build strong partner networks consistently outperform those that go it alone. Partners have been and always will be instrumental in scaling brand awareness, delivering exceptional customer value, and driving mutual growth.

Telemetry Pipeline 101

Are you looking to enhance your observability and gain deeper insights into your systems? Curious about how a Telemetry Pipeline can revolutionize your monitoring and troubleshooting capabilities while keeping the cost low? Join Mezmo’s Bill Balnave (Vice President of Technical Services) for an insightful webinar unraveling Telemetry Pipeline’s key concepts, highlighting its significance in modern software development and operations. Discover how a Telemetry Pipeline enables you to collect, profile, transform, and analyze crucial telemetry data from your applications and infrastructure.

Kubernetes Monitoring and Alerting Made Easy with Splunk Observability Cloud and OpenTelemetry

In this video, I'll show you how to quickly setup monitoring and alerting for your Kubernetes clusters using Splunk Observability Cloud. We’ll start by deploying the Splunk OpenTelemetry Collector using Helm, and then use the Kubernetes Navigator inside Splunk Observability Cloud to view the health of our cluster and the applications it’s hosting. I’ll demonstrate AutoDetect detectors and alerts by intentionally triggering an issue in the cluster and walk through the alerting process. We’ll review the alerts in Splunk Observability Cloud and then resolve the issue in the cluster.

Petabyte Scale, Gigabyte Costs: Mezmo's Evolution from ElasticSearch to Quickwit

At Mezmo, we handle an enormous volume of telemetry data for our customers and ourselves, requiring a robust and efficient search and analytics backend. For years, ElasticSearch served us well, but as our infrastructure grew to a multi-cluster, multi-petabyte scale, we started to see the cracks—rising costs, performance bottlenecks, and scalability concerns. We needed a change, one that would make our system more cost-effective while maintaining speed and reliability.

Why I'm Betting on Observo AI

After two decades leading marketing teams in enterprise software, particularly in IT and cybersecurity, you develop a sixth sense for transformative technologies. As I've watched security and observability data volumes compound at an alarming rate every 2-3 years, one thing has become crystal clear: enterprises are facing an unprecedented data crisis that demands an intelligent, autonomous solution.

SSHD Logs 101: Configuration, Security, and Troubleshooting Scenarios

Secure Shell (SSH) is a fundamental tool for remote system administration, and its logs play a critical role in security monitoring, debugging, and compliance. SSHD logs provide insights into authentication attempts, connection successes, failures, and potential intrusions. This guide explores everything you need to know about SSHD logs, including their location, format, analysis, and lesser-known security practices to maximize their effectiveness.

Resolving Heroku deployment issues using comprehensive log data

Deploying applications on Heroku offers a streamlined process for developers, but even the most well-optimized setups can encounter deployment issues. To effectively resolve these issues, it's crucial to gain real-time insights into your app’s behavior, traffic, and performance metrics. The solution to resolving Heroku deployment challenges lies in leveraging the power of log management.

Kubernetes 101

When you get behind the wheel of your car, one of the first things you see is the dashboard. Your dashboard provides various information about all the different technologies that make the car run smoothly, like helping you control your speed, providing insight into your fuel levels, and offering suggestions for regular maintenance, like oil changes. For developers, Kubernetes acts as that one-glance dashboard to provide insights about container performance, maintenance needs, and storage requirements.

Better Together: Splunk ES & Observo AI Data Pipelines

Security data collection is the foundation of Splunk Enterprise Security (ES), but there are several challenges that organizations face when gathering and preparing data for effective analysis. These issues can impact the accuracy, efficiency, and value of the security insights derived from Splunk ES. These challenges can result in blind spots, inefficiencies, and inaccurate detection.

The Basics of Log Parsing (Without the Jargon)

Logs are crucial for understanding what's happening in your system, but they can often be hard to make sense of. Log parsing is the key to turning raw, unstructured data into something useful. In this blog, we'll explore the basics of log parsing, its importance, and how it helps you extract valuable insights from your logs without all the clutter.

Syslog Protocol: A Reference Guide

Syslog was developed in the 1980s by Eric Allman as part of the Sendmail project and adopted by many systems over the years. When looking at Syslog, there are a few protocol options, each with slight differences. In this reference guide, I’ll break down the differences so that you have a guide to see these formats when utilizing this protocol.

9 essential metrics to track for effective IT operations with log management tools

Monitoring the correct metrics is crucial for efficient IT operations, as it ensures the smooth functioning of an organization's infrastructure. One crucial aspect of this process is log management, which empowers IT teams to address critical aspects of IT infrastructure, including performance, availability, security, resource usage, and integration.