Operations | Monitoring | ITSM | DevOps | Cloud

Logging

The latest News and Information on Log Management, Log Analytics and related technologies.

Kubernetes Security Best Practices

As the container orchestration platform of choice for many enterprises, Kubernetes (or K8s, as it’s often written) is an obvious target for cybercriminals. In its early days, the sheer complexity of managing your own Kubernetes deployment meant it was easy to miss security flaws and introduce loopholes. Now that the platform has evolved and been managed, Kubernetes services are available from all major cloud vendors, and Kubernetes security best practices have been developed and defined.

Using the Density Function for Adaptive Thresholding with Splunk

It’s 3PM on a Friday, and your day is winding down. Suddenly, you get an urgent email from your boss asking you to set up an alert for monitoring volume. You consider this an easy task. You set a hard threshold for what you think is a low volume based on the last four hours of incoming data.

Time Series Forecasting Use Cases and Anomaly Detection

Wouldn’t it be great to peek into the future and find answers to the problems that you’re facing today? This may sound like science fiction, but many companies currently possess this capability, and they are creating strategies around it to strengthen their monitoring and analytical capabilities. One way is time series forecasting, a statistical method. You can take advantage of the insights of time series forecasting by using techniques like anomaly detection to gain.

Monitor your IoT devices at scale with Datadog Log Management

The Internet of Things (IoT) can be found in a diverse range of devices, including fleets of autonomous vehicles, automobiles, planes, electric charging stations, and voice controllers. These devices are embedded with gateways, electronics, actuators, platform hubs, and cloud-service connectivity, enabling them to exchange data across the physical, network, and application layers that constitute IoT architecture.

The ultimate logging series: Logging using PHP functions

In part one of our PHP logging blog series, we discussed what logging is and covered the basics of creating logs in PHP applications using the PHP system logger. While the PHP system logger automatically records critical events like errors in code-execution, a more customized logging setup can be achieved using PHP functions. For part two, let's look at the basics of creating custom error logs by calling PHP functions.

APM Vision for Open Source and Security

Earlier this month, we shared exciting news with our first placement in the 2022 Gartner® Magic Quadrant™ for Application Performance Monitoring and Observability: we are in the Visionary Quadrant. This research is near to my heart, as I led this research for four years; so, I wanted to reflect on why this is an accurate placement for Logz.io. The Visionary Quadrant is designated for those organizations who are pushing the boundaries of a specific market and technology.

Delivering Outcome-Based Results at Gartner's Security & Risk Summit

It’s common for most CISOs to lead off a security conversation by comparing what other companies in the industry are spending on cybersecurity and simply matching that. After all, regardless of the results, the CISO can always tell the board of directors they’re following industry guidelines around security budgets. The problem is security outcomes are bad regardless of budgets. It’s not what you spend. It’s the results you get that matter.

Sematext Infrastructure Monitoring Tool | Full stack observability | Product and Feature Overview

Sematext infrastructure Monitoring platform is an easy and effective way to monitor a full-stack. Monitoring a monolithic system was an easy task. But as software becomes more distributed, DevOps, SysAdmins, and run-of-the-mill developers need to have monitoring tools that are capable of monitoring dynamic distributed systems.

Log Management: A Useful Introduction

We find ourselves submerged in a sea of software applications practically all the time. Their primary job is to make life easier and help us accomplish certain tasks. However, these applications require a lot of data. What’s more, their development requires a systematic approach with proper management of that data — and its related activities. But that’s not a straightforward and simple process. What happens if these applications stop running?