Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Log Management, Log Analytics and related technologies.

Manage metrics & logging costs with Grafana Cloud + Log Volume Explorer demo | ObservabilityCON

Are your SRE and platform teams under pressure to ingest fewer metrics and logs in the name of cost savings? Reducing costs does not have to mean reduced observability. This recording walks through the cost management features in Grafana Cloud that allow you to analyze, attribute, monitor, and optimize your metrics and logs usage – and lower costs – without compromising your observability strategy.

SIEM Implementation Guide: A How-To Guide

In an era where cybersecurity threats are not just frequent but increasingly sophisticated (and becoming more costly), the need for robust defense mechanisms has never been more critical. Security Information and Event Management (SIEM) emerges as a cornerstone in this complex data environment. It’s not just another tool in your cybersecurity toolkit; it’s a solution designed to elevate your organization’s security posture.

Active vs. Passive Monitoring: What's The Difference?

Today, it’s perfectly normal for businesses to continuously monitor software applications and IT infrastructure to ensure uninterrupted customer service. Active and passive monitoring are the two popular methods enterprises use for infrastructure and application performance monitoring (APM). As the names indicate, these two approaches to monitoring are very different.

The Leading Jaeger Dashboard Examples

Unlocking the full potential of observability and tracing in modern software ecosystems has become imperative for businesses striving to deliver improved reliability and user experience. In this comprehensive roundup, we will dive into the world of Jaeger-incorporated observability and tracing dashboards, offering a curated selection of the best use cases that empower DevOps teams, engineers, and developers to gain unparalleled insights into the inner workings of their applications.

Generative AI & Enterprise IT: Overhyped or Radically Under Estimated?

Join Cribl’s Jackie McGuire and Ed Bailey as they discuss AI's current and future state. They will discuss the many challenges and vast promise of this promising way to increase productivity and solve problems. In addition, Jackie and Ed will also comment on SolarWinds’ response to the SEC charges alleging Solarwinds and its CISO defrauded investors by repeatedly misleading them about its cybersecurity posture. Please join us for a great conversation.

Announcing the Splunk Add-on for OpenTelemetry Collector

The Splunk Add-on for OpenTelemetry Collector is a variation of the Splunk Distribution of the OpenTelemetry Collector that simplifies metrics and traces data collection, configuration and management. Since it is an add-on, users can deploy it alongside Universal Forwarders using tools like Deployment Server to start collecting high-fidelity metrics and traces from 1000s of their hosts easily. We’re happy to announce that the Add-On is now generally available in Splunkbase.

Deployment Frequency (DF) Explained

Technical teams use various metrics and indicators to track performance and success. For DevOps teams, among the most important metrics is deployment frequency. Deployment frequency can help you evaluate the software delivery performance of teams that develop software and apps. In this article, I’ll look at using this metric to calculate deployment rate, the importance and best practices for improving your deployment rate and setting your DevOps team up for success.

Mastering Firewall Logs - Part 1

A firewall is a network security device or software that is used to monitor and control incoming and outgoing network traffic based on predetermined security rules. Firewall Logs contain valuable information about network and security events. These logs are essential for security and infrastructure monitoring for enterprises. While this data is critical to securing enterprise networks, they are also one of the most voluminous data types security teams use to monitor and secure their networks.

5 Elasticsearch Disadvantages You Should Know

Since its initial release in 2010, Elasticsearch has grown into the most popular enterprise search engine with use cases that range from web crawling and website search to application performance monitoring and security log analytics. But despite its widespread adoption and success, Elasticsearch does have some notable disadvantages that you should consider - especially if you’re envisioning a high-scale deployment with a large amount of daily ingestion.

The future of Sumo Logic begins at the atomic level of logs

This time of year, complete with Thanksgiving, re:Invent and December holidays around the world, ends up feeling like a natural moment to pause, reflect, and plan for what’s ahead. This is especially true this year, as it also marks my half-year anniversary as CEO of Sumo Logic. I have a strong sense of why I joined, what I’ve learned since leading the incredible team of Sumos, and where I see us going in the future.