Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Log Management, Log Analytics and related technologies.

Energy-Efficient Computing: How To Cut Costs and Scale Sustainably in 2026

With AI the centerpiece of technology and innovation today, energy efficient computing is quietly becoming one of the most urgent challenges. In this article, we will discuss what makes energy efficient computing relevant for your organization, especially when modern resource-intensive AI workloads play an important role in driving your business operations and services.

Deploying Loki on Kubernetes via Helm (Loki Community Call - October 2025)

This Loki Community Call is about deploying Loki on Kubernetes via Helm charts. We talk about why you might want to use Helm to deploy on Kubernetes, best practices for deployment, and which Helm chart you should use! We are Jay Clifford and Nicole van der Hoeven, Developer Advocates at Grafana Labs, and we have invited Grafana Champion and Loki Helm Maintainer Jan-Otto Kröpke, Principal Cloud Architect at QualityOperations GmbH, to talk about the state of the Loki Helm Chart.

Sumo Logic Dojo AI overview

Stop the firefighting and get instant answers with Sumo Logic Dojo AI. When a security incident hits, you risk losing money and time as you wait for investigations and troubleshooting. Discover how Dojo AI agents simplify investigations by surfacing potential threats, providing actionable insights, and guiding you to the root cause faster using natural language.

Sumo Logic Academy - Training and Certification Overview

In 2025, Sumo Logic revamped its education and certification program, introducing industry-aligned assessments, digital badges and many free training offerings, including industry leading free instructor led classrooms and interactive hands-on labs. This video walks through all Sumo Logic Academy program offerings.

Sliding Through Log-Time Space

This post kicks off a new series written by the Graylog Development Team. In these updates, we’ll highlight the features and fixes that make daily work in Graylog smoother. We want to show the work we care so much about and present the challenges we faced and overcame. Today, we’re starting with one of those minor but functional enhancements: Graylog time-range stepping.

How Generative AI is shaping the future of enterprise applications

The next golden age of artificial intelligence has arrived, but the path forward is far from certain. Technology leaders are presented with a tremendous opportunity to revolutionize their business — that is, if they can find a way to tap into the full potential of their organization's data. In Episode 4 of Elastic's new limited series, Generation AI, Elastic's Sr. Director, Enterprise Applications, Jay Shah, shares how he believes generative AI will shape the future of enterprise applications.

Artificial Intelligence as a Service AIaaS (AIaaS): What is Cloud AI & How Does it Work?

Today, organizations looking to build AI products and services using large language models (LLMs), agentic AI, and generative AI often start by investing in artificial intelligence as a service (AIaaS), also known as cloud AI. AIaaS provides a scalable, flexible, and cost-effective way for businesses of all sizes to access advanced AI technologies without the need for extensive in-house expertise or infrastructure.

Transform and Migrate Logs with Datadog Custom Processor

See how Datadog’s new Custom Processor in Observability Pipelines helps you transform and migrate logs from platforms like Splunk and Sumo Logic with precision and control. This demo walks through real examples of using VRL (Vector Remap Language) to enrich log data, rewrite timestamps, apply quotas, and securely process archives.

How AI-Native Pipelines Reduce 80% of Noisy Data for Lower Costs and Better Security

Security data is exploding. Most organizations see their telemetry volumes double every two to three years, driven by cloud adoption, distributed architectures, and an expanding attack surface. Yet only a small percentage of that data contains real indicators of compromise. Analysts estimate that nearly 80 percent of SIEM and observability logs have little or no analytical value.