Operations | Monitoring | ITSM | DevOps | Cloud

Latest Posts

Introducing Multiple Shipping Tokens for Logz.io Accounts

We’re excited to share that we’ve revamped our Shipping Tokens feature! If you’re a Logz.io user, you’re familiar with the key role tokens play in shipping and protecting your data. As a form of virtual identification, tokens help us properly attribute data to the right account. They are required in a variety use cases such as log shipping, API access, and read access. And in addition, they are also mandatory for compliance.

Shipping Metrics from Hashicorp Consul with ELK and Logz.io

Microservices interact in so many ways. Load balancers, security authentication, and service discovery are just the tip of the iceberg. It can get confusing, if not outright messy. But why be messy when you can be meshy? This is where service meshes come into play, linking the roles these tools have in a common ‘net’ that ties and weaves the whole architecture together. Hashicorp has produced one of the most popular of these organizational assets — Consul Connect.

Jaeger Essentials: Jaeger Persistent Storage With Elasticsearch, Cassandra & Kafka

Running systems in production involves requirements for high availability, resilience and recovery from failure. When running cloud native applications this becomes even more critical, as the base assumption in such environments is that compute nodes will suffer outages, Kubernetes nodes will go down and microservices instances are likely to fail, yet the service is expected to remain up and running.

Full Observability with Your Node.js App

Javascript is a pretty prolific programming language, used daily by people visiting any number of websites and web applications. NodeJS, it’s server-side version, is also used all over the place. You’ll find it deployed as full application stacks to functions in things like AWS Lambda, or even as IoT processes with things like Johnny Five. So when we think about Observability in the context of a nodejs stack, how do we set it up and get the information flowing?

Secure Your Endpoints with ESET and Logz.io

Watching too many movies might give you the impression that cyber attacks are launched by well-funded masterminds able to control the internet at their whim. But really, successful attacks can be as simple as disguising some malicious software as a link to an often-used site, and tricking people into clicking it, known as phishing. The result is that many cyber attacks are carried out by taking advantage of unsuspecting end users.

How To 'Translate' Grafana Dashboards from Graphite to Elasticsearch

Grafana is the de facto open source tool for visualizing metrics. Grafana supports many different backends for data sources and handles each one slightly differently. This blog post is geared towards helping convert Grafana dashboards from using the Graphite backend to using Elasticsearch as a metrics datasource. There are many similarities between how to use both as datasources and how to plot graphs around them, but there are also many differences that need to be accounted for.

Observability in the Cloud-Native Age: Announcing the DevOps Pulse 2020

It’s that time of year again — the DevOps Pulse 2020 is here! Last year, nearly 1,000 engineers around the world provided their insights in the DevOps Pulse 2019 so we could get the community’s perspective on the growth and challenges associated with observability, cloud monitoring and more. As we discovered in last year’s DevOps Pulse, observability is still a major challenge for many organizations.

SIEM vs. SOAR: What's the Difference?

Cloud security is the combination of tools and procedures that form a defense against unauthorized data exposure by securing data, applications, and infrastructures across the cloud environment and by maintaining data integrity. To read more about the basic principles of cloud security, check out our previous article on the subject. Cloud security is a constant concern for R&D teams, and more and more methodologies are being introduced to help teams achieve their goals.