Operations | Monitoring | ITSM | DevOps | Cloud

Logging

The latest News and Information on Log Management, Log Analytics and related technologies.

Data Is a Blizzard: Just Because Each Snowflake Is Unique Doesn't Mean Your Search Tools Have to Be Too

Cribl Search is agnostic, allowing administrators to now query Snowflake datasets as they can dozens of other Lakes, Stores, Systems & Platforms. The data that IT and security teams rely on to monitor network operations continues to grow at a 28% CAGR, and it’s stressing many organizations’ ability to analyze all this data effectively. In fact, in some cases, less than 2% of it ever gets looked at.

How to Send Grafana Alloy Logs to Grafana Loki | Ask the Experts | Grafana

In this video, Matt Durham, Sr. Software Engineer on the Grafana Alloy team, shows you how to send Grafana Alloy logs to Loki. Specifically, we address the question: "Is it possible to send data from one Grafana Alloy to another? Could anyone supply me with config examples of such interactions? If I send data from Grafana Alloy directly to Loki, it is working. If I send data from Grafana Alloy to another, and then to Loki, the second instance gives me an error.".

You don't need ALL those metrics!

Metrics are key to monitoring system health and performance but you probably are ingesting far more metrics than you will ever need or use. The issue is that popular tools in this space, such as OpenTelemetry and Prometheus, leverage node exporters to emit a plethora of metrics. OpenTelemetry tracks even the minutest details of system performance. Prometheus exporters can generate a vast array of metrics, ranging from CPU usage to disk I/O, and everything in between.

The Power of Combining a Modular Security Data Lake with an XDR

The 2024 Global Digital Trust Insights survey from PwC reports that 36% of businesses have experienced a data breach that cost more than $1 million to remediate. Cyber threats are clearly on the rise and in today’s volatile threat environment, it is a matter of when - not if - a cybersecurity incident will occur. Digital adversaries are becoming more sophisticated and relying on weak links to exploit company applications and infrastructure.

Decision Intelligence: An Introduction

Every day, employees and leaders of enterprise IT organizations make multiple decisions that affect their company’s success or failure. To stay ahead of the competition and drive innovation, an increasing number of organizations are turning to decision intelligence (DI), a relatively new field combining data science, decision theory and artificial intelligence, to augment and improve decision-making.

Graylog Geolocation: Mapping Your Log Data

In today’s distributed work environment, understanding the geographic origin of network traffic has become more crucial than ever. As organizations adapt to remote work, IT teams face the challenge of monitoring and analyzing an expanding array of IP addresses from various locations. Graylog’s geolocation feature offers a powerful solution to this challenge, allowing teams to extract and visualize geographic information from IP addresses in their logs.

Unlocking Business Insights with Telemetry Pipelines

Imagine running a large company where data-driven decisions give you a competitive edge. You use a lot of business intelligence tools that tap into vast amounts of data, such as sales figures, inventories, and expenses. This analysis tells you how your company is performing. However, it does not reveal how your "company infrastructure" is performing. This crucial information comes from your systems in the form of telemetry data, such as logs and events.

The Leading Network Device Monitoring Tools

Ensuring the security of your network infrastructure is critical for all organizations, and this requires going beyond traditional network monitoring and incorporating the monitoring of network devices, such as routers, switches, and other network devices. Whilst network monitoring includes the monitoring of devices, dedicated network device monitoring is a more thorough process for guaranteeing the health and performance of your organization's network devices.

Without AI, Your Telemetry Data Pipeline Sucks

History is filled with stories of human triumph. One of the most famous such stories is that of John Henry, “The Steel Driving Man.” As the traditional American folk story goes, John Henry and his fellow workers were faced with the arrival of the steam engine, which threatened to replace their manual labor. To prove that human strength and skill could outperform the new technology, John Henry challenged the machine to a contest.

Unlock the Value of Cloud: Introducing Splunk Cloud Value Calculator

In the rapidly evolving digital landscape, organizations are increasingly turning to the cloud powered with AI capabilities to enhance efficiency, scalability and innovation. Splunk, a leader in security and data observability, has been at the forefront of this transformation.