Operations | Monitoring | ITSM | DevOps | Cloud

Latest News

What's New in Open 360? January 2024 Update

At Logz.io, we recently announced the release of App 360, a new solution that aims to shift the paradigm around application performance monitoring (APM) systems. To better give our customers a look at the new solution within the Logz.io Open 360™ platform for essential observability, we recently hosted a webinar explaining App 360 in greater depth and provided a detailed product demonstration. Let’s take a closer look at the key highlights and insights we shared during the webinar.

Loki vs Elasticsearch - Which tool to choose for Log Analytics?

Elasticsearch, or the ELK stack, is a popular log analytics solution. The Loki project was started at Grafana Labs in 2018. Grafana leads the development of Loki, while Elastic is the company behind Elasticsearch. In this article, we will do a detailed comparison between these two tools for log analytics. Log data helps application owners debug their applications while also playing a critical role in cyber security.

Managing Telemetry Data Overflow in Kubernetes with Resource Quotas and Limits

One of the inherent challenges you'll face when working with Kubernetes is that a typical cluster includes many resources that produce telemetry data. Because producing and moving telemetry data consumes resources, you can end up in situations where different workloads are competing for the resources necessary to manage telemetry data.

NGINX Access and Error Logs

Nginx, a widely used web server and reverse proxy, maintains two crucial logs that provide valuable insights into its performance and user interactions: the access log and the error log. These logs play a pivotal role in monitoring and troubleshooting web server activities. The access log records every request made to the server, capturing details such as the requested URL, client's IP address, response status code, and user agent.

How to Create Great Alerts

We’ve all been guilty of it. Creating rules and filters to hide those alerts that, for the most part, are just noise. Only then to have notifications about a legitimate issue also get swept up by those same filters. There’s only so many times we can break concentration and disrupt productivity before getting fed up with false positives and ignoring everything completely.

How Cribl Helps the UK Public Sector Manage Challenges Around Growing Data Costs and Complexity

As the Data Engine for IT & Security, Cribl helps organisations overcome several challenges, including : In this first blog, we will concentrate on how Cribl can help the UK public sector deal with ever-rising data volumes whilst controlling costs.

AI at Splunk: Trustworthy Principles for Digital Resilience

There’s no doubt AI will radically reimagine the way we live, work and interact. It will empower new ways to solve business challenges and deliver customer value, but such a widespread impact requires a holistic approach. Building AI responsibly is one thing, but embedding trust into every aspect of our AI strategy is another entirely – and that’s what Splunk sets out to do.

EMA explores Elastic AI Assistant for Security

Spoiler alert: it’s great! Elastic Security has been making waves among busy security analysts everywhere with the launch of Elastic AI Assistant. Whether it’s synthesizing alert details and suggesting next steps, or the recent addition from Elastic 8.11 to generate ES|QL queries from natural language, there’s a lot to love about Elastic AI Assistant for security efforts.

Why Network Load Balancer Monitoring is Critical

Your networks are the highways that enable data transfers and cloud-based collaboration. Like highways connect people to physical locations, networks connect people to applications and databases. As you would look up the fastest route between two physical locations, your workforce members need the fastest connectivity between two digital locations. Network load balancers enable you to prevent and identify digital “traffic jams” by redistributing incoming network requests across your servers.

How to easily add application monitoring in Kubernetes pods

The Elastic APM K8s Attacher lets the Elastic APM agent auto-attach to the application in your pods by adding just one annotation to your deployment The Elastic® APM K8s Attacher allows auto-installation of Elastic APM application agents (e.g., the Elastic APM Java agent) into applications running in your Kubernetes clusters. The mechanism uses a mutating webhook, which is a standard Kubernetes component, but you don’t need to know all the details to use the Attacher.