Operations | Monitoring | ITSM | DevOps | Cloud

The ultimate logging series: Logging using PHP functions

In part one of our PHP logging blog series, we discussed what logging is and covered the basics of creating logs in PHP applications using the PHP system logger. While the PHP system logger automatically records critical events like errors in code-execution, a more customized logging setup can be achieved using PHP functions. For part two, let's look at the basics of creating custom error logs by calling PHP functions.

Described the Benefits of the Barcode System in Small Businesses.

As we all know that the barcode was invented in 1966 And utilized in business but it was widely used after 1970. However, it became a revolutionary asset tracking technology as it was effective and helpful in keeping track of inventory and assets. Later barcode inventory management system was built to improve data accuracy and its advanced version QR (Quick Response) Code is also launched which was also successful among businesses for asset tracking and marketing purpose.

APM Vision for Open Source and Security

Earlier this month, we shared exciting news with our first placement in the 2022 Gartner® Magic Quadrant™ for Application Performance Monitoring and Observability: we are in the Visionary Quadrant. This research is near to my heart, as I led this research for four years; so, I wanted to reflect on why this is an accurate placement for Logz.io. The Visionary Quadrant is designated for those organizations who are pushing the boundaries of a specific market and technology.

New in Grafana 9: Introducing the command palette

Grafana is an open source tool for people with many different perspectives and various skill levels. Many initiatives to improve the Grafana user experience start by thinking about someone who’s just getting started on their observability journey. However, late last year, a Grafana Labs hackathon team looked to improve the user experience for our power users by introducing a command palette to Grafana.

Part I: A Journey of a Thousand Binaries - Types of Software Dependencies

As software developers, one of the things that we worry a lot about is our software dependencies. To speed up delivery time of new functionality within our code we reuse software – we don’t have time to reinvent the wheel. We stand on the shoulders of giants and leverage all the hard work and lessons learned from the software developers of our past. Sounds great right! Well mostly great because we are faced with the underlying trials intrinsec to software development.

Ingesting HTTP Access Logs from AppService

Debugging application performance in Azure AppService is something that’s quite difficult using Azure’s built-in services (like Application Insights). Among some of the issues are visualizations, and the time it takes to be able to query data. In this post, we’ll walk through the steps to ingest HTTP Access Logs from Azure AppService into Honeycomb to provide for near real-time analysis Access Logs.

How to Standardize Service Ownership at Scale for Improved Incident Response

Service ownership is a DevOps best practice where team members take responsibility for supporting the software they deliver at every stage of the development lifecycle. This level of ownership brings development teams much closer to their customers, the business, and the value being delivered. Service owners are the subject matter experts (SMEs) for their services – and in a service ownership model, they are also responsible for responding to any production issues.

Matplotlib Tutorial - Learn How to Visualize Time Series Data With Matplotlib and InfluxDB

A time series is a sequence of data points (observations) arranged chronologically and spaced equally in time. Some notable examples of time series data are stock prices, a record of annual rainfall, or the number of customers using a bike sharing app daily. Time series data exhibits certain patterns, such as the highs and lows of hotel prices depending on season.

Delivering Outcome-Based Results at Gartner's Security & Risk Summit

It’s common for most CISOs to lead off a security conversation by comparing what other companies in the industry are spending on cybersecurity and simply matching that. After all, regardless of the results, the CISO can always tell the board of directors they’re following industry guidelines around security budgets. The problem is security outcomes are bad regardless of budgets. It’s not what you spend. It’s the results you get that matter.