Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Data Lakes Are Gaining Maturity, According to 2021 Gartner Hype Cycle for Data Management

IT leaders’ experiences with data lakes have been a roller coaster ride since their inception in 2010. To some, that roller coaster ride might resemble the canonical Hype Cycle graphic, trademarked by Gartner to show the maturity curve of technologies in a given category over time. This year’s Hype Cycle for Data Management report was just released, revealing that modern data lakes are poised to exit the Trough of Disillusionment and enter the Slope of Enlightenment in 2022.

All You Need To Know About HAProxy Log Format

HAProxy is one of the fastest and most widely-used load balancing solutions available today. If you’re already using HAProxy, or if you’re considering using HAProxy in your environment, then this is a great place to start. On this page, we discuss HAProxy logging and why logging is such a vital component of the load balancer implementation. We then take a deep dive into the logging offered by HAProxy.

Secure your deployments on Elastic Cloud with Google Cloud Private Service Connect

We are pleased to announce the general availability of the Google Cloud Private Service Connect integration with Elastic Cloud. Elastic Cloud VPC connectivity is now available to all customers across all subscription tiers and cloud providers (AWS, Microsoft Azure, and Google Cloud).

Taming Rails Logging with Lograge and LogDNA

Rails is a classic on Ruby for a reason. The framework is powerful, intuitive and the language has a low entry bar. However, being designed when systems existed on a single server, standard Rails logging is excessively fractionalized. Even on a single server, a straightforward call can quickly turn into seven unique, unconnected logs.

Understanding Cardinality in a Monitoring System and Why It's Important

The journey to becoming cloud-native comes with great benefits but also brings challenges. One of these challenges is the volume of operational data from cloud-native deployments — data comes from the cloud infrastructure, ephemeral application components, user activity, and more. The increased number of data sources does not only increase datapoint volume – it also requires that monitoring systems store and query against data with higher cardinality than ever before.

Elasticsearch Audit Logs and Analysis

Security is a top-of-mind topic for software companies, especially those that have experienced security breaches. Companies must secure data to avoid nefarious attacks and meet standards such as HIPAA and GDPR. Audit logs record the actions of all agents against your Elasticsearch resources. Companies can use audit logs to track activity throughout their platform to ensure usage is valid and log when events are blocked.

9 Best Practices for Application Logging that You Must Know

Have you ever glanced at your logs and wondered why they don't make sense? Perhaps you've misused your log levels, and now every log is labelled "Error." Alternatively, your logs may fail to provide clear information about what went wrong, or they may divulge valuable data that hackers may exploit. It is possible to resolve these issues!!!

Logging Agents Vs Log Libraries

Log management has been around for a long time, but how we manage our logs has changed profoundly over the years. For effective log management, there are times when you may have to trade off the new for the old, and vice versa. A clear understanding of log agents and log libraries will help assess what works best for different applications and infrastructures.