Operations | Monitoring | ITSM | DevOps | Cloud

Logging

The latest News and Information on Log Management, Log Analytics and related technologies.

From Necessity to Opportunity: The Customer Push for SIEM Options

The SIEM market attracts attention for a variety of reasons. First, it is dominated by a number of large players but there are a range of smaller companies vying for market share. It is also a market generally accessible to new entrants. There’s always a new company pitching a different spin on SIEM, whether it’s a new architectural model in the cloud, faster analytics from running on a third-party data warehouse, or leaning into new, undefined terms like a security data fabric.

How to Build a Custom OpenTelemetry Collector

Telemetry data collection and analysis are important for businesses. We're diving right in to explain the ins and outs of the OpenTelemetry Collector, including its core components, distribution selection, and customization tips for optimal data collection and integration. Whether you're new to OpenTelemetry or expanding your capabilities, this will help you effectively use the OpenTelemetry Collector in your observability strategy.

Securing the Foundation of Cribl Copilot

Integrations are the bread and butter of building vendor-agnostic software here at Cribl. The more connections we provide, the more choice and control customers have over their unique data strategy. Securing these integrations has challenges, but a new class of integrations is creating new challenges and testing existing playbooks: large language models. In this blog, we are going to explore why these integrations matter, investigate an example integration, and build a strategy to secure it.

How OTel Empowers You to Handle Unified Data

Discover the power of OpenTelemetry to consolidate your telemetry data. Our expert-led workshop demonstrates standardization techniques for metrics, logs, and traces. Delve into real-world applications, including capturing Prometheus metrics, managing logs with FluentD/Bit, and collecting traces with Jaeger.

Introduction to Ingesting Logs into Loki with Fluentd and Fluent Bit | Zero to Hero: Loki | Grafana

Have you just discovered Grafana Loki and plan to use FluentD or Fluent Bit as your telemetry collector? Or are you trying to decide which agent is right for you? In this "Zero to Hero" episode, we cover the basics of FluentD and Fluent Bit, highlighting their differences and helping you determine when to use one over the other. Additionally, we guide you through configuring both agents' Loki plugins to write logs directly into Loki.

Cribl's Blueprint for Secure Software Development.

What does it take to build software for the most security-demanding customers worldwide? At Cribl, building secure products is integral to our engineering identity. We have established a secure software development lifecycle that is both culturally and policy-driven, integrating product security tooling and processes into every architecture review, pull request, and release, whether major or minor.
Sponsored Post

CloudFabrix "Splunkify" for Cisco-Splunk

Splunk and CloudFabrix are both powerful tools in the realm of IT operations management, but they serve different primary functions, have different use cases and are complementary to each other. Splunk focuses on organizations requiring real-time visibility into IT operations with powerful search and analysis capabilities for large volumes of data, real-time monitoring and alerting for IT operations, log management, security incident response, Observability, and rich visualizations for AIOps.

The Top 5 Security Logging Best Practices to Follow Now

Security logging is a critical part of modern cybersecurity, providing the foundation for detecting, analyzing, and responding to potential threats. As highlighted by OWASP, security logging and monitoring failures can lead to undetected security breaches. With the average cost of a data breach adding up to $4.45 million, most organizations can’t afford to miss a security incident.