Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

Python Logging - The Ultimate Guide

This guide is focused on how to log in Python using the built-in support for logging. It introduces various concepts that are relevant to understanding Python logging, discusses the corresponding logging APIs in Python and how to use them, and presents best practices and performance considerations for using these APIs.

5 Reasons Why You Should Invest in a Docker Logging Tool

Today, continuous development and continuous delivery have become the de facto mode of application development for businesses seeking higher agility. With the continuous push to achieve higher efficiency and reliability in running software operations, container technologies like Docker, Kubernetes, and Mesos have become mainstream. Among these technologies, Docker is the most popular.

Applying AIOps to Logs Is Key for Observability

Logging is an essential method to understanding what’s happening in your environment. Logs help developers and system administrators understand where and when things have gone wrong. Ideally, logs on their own would suffice as indicators of what’s happening. However, there’s far too many log messages being produced in today’s world and most don’t contain the information we actually need.

Mitigate Logging Costs While Maintaining Full Observability with Logz.io

Considering the scale of log data that modern cloud environments generate, it’s oftentimes prohibitively expensive to index all of it. For monitoring and logging, cost management is just as important as in other parts of the business. Whether sudden spikes of log data overwhelm databases or good business generates more activity in your environment, teams should anticipate and mitigate the steep costs that result from high log volumes.

How to implement Prometheus long-term storage using Elasticsearch

Prometheus plays a significant role in the observability area. An increasing number of applications use Prometheus exporters to expose performance and monitoring data, which is later scraped by a Prometheus server. However, when it comes to storage, Prometheus faces some limitations in its scalability and durability since its local storage is limited by single nodes.

Profiling "VIP Accounts" Part 1

Detecting malicious activity is rarely easy, but some attacker methods are more challenging to detect than others. One of the most vexing techniques to counter is credential theft. Attackers that gain control over a user account have access to the assets of that user. If the credentials are for an account with special privileges, like a system administrator, then the attacker may be able to gain access to system-wide resources and even be able to change logs to cover their tracks.

The Cost of NOT Monitoring Every Application

If you’ve been building or supporting applications for a while, you’ve probably experienced the uncomfortable postmortem meetings that inevitably follow significant service interruptions. You know how it works. There was a critical outage in one of your apps and it took the team an entire week to track down and fix the issue. Customers and revenue were lost. Now you’re sitting in a large conference room with executives to discuss what happened and why.

Elastic Stack 7.7.0 released

We are pleased to announce the general availability of version 7.7 of the Elastic Stack. Like most Elastic Stack releases, 7.7 packs quite a punch. But more than the new features, we’re most proud of the team that delivered it. A feature-packed release like this is special during normal times. But it’s extra special today given the uncertain times we are in right now.