Operations | Monitoring | ITSM | DevOps | Cloud

The latest News and Information on Log Management, Log Analytics and related technologies.

SIEM vs. SOAR: What's the Difference?

Cloud security is the combination of tools and procedures that form a defense against unauthorized data exposure by securing data, applications, and infrastructures across the cloud environment and by maintaining data integrity. To read more about the basic principles of cloud security, check out our previous article on the subject. Cloud security is a constant concern for R&D teams, and more and more methodologies are being introduced to help teams achieve their goals.

.NET Logging: Best Practices for your .NET Application

Logging is a key requirement of any production application. .NET Core offers support for outputting logs from your application. It delivers this capability through a middleware approach that makes use of the modular library design. Some of these libraries are already built and supported by Microsoft and can be installed via the NuGet package manager, but a third party or even custom extensions can also be used for your .NET logging.

Exclaimer: Shortening the lengths of incidents with Datadog

Hear how Matt Hodge from Exclaimer leverages Datadog Log Management to migrate away from a homegrown solution and find one platform to manage dev and ops logs. Through deep integrations with Microsoft Azure, Exclaimer is able to gain rapid visibility into their entire Azure-based infrastructure as well.

Announcing the Elastic Contributor Program

Open source contributions are foundational to Elastic — from Elasticsearch’s Apache Lucene core to the addition of open source Logstash and Kibana to form the Elastic Stack you’ve come to know and love. Over the years, the Elastic community has created over 90 Beats, shared use case tutorials like those from Volvo, T-Mobile, and Microsoft, and presented at hundreds upon hundreds of meetups.

Using Private Threat Intelligence Feeds on Hidden Security Attacks with Logz.io

Oftentimes, security attacks that were clearly recorded in logs go unnoticed. They are obscured by a large sea of log data created by most modern cloud environments. In some cases, like during a DDoS attack, there will be a huge spike in logs so it will be very clear what happened. In other situations, just a few logs will document the attack. Finding these logs can be like finding a needle in a hay stack. But if you know what to looks for, it doesn’t need to be so hard to spot these attacks.

JFrog Platform Log Analytics Splunk App

The Splunk App for JFrog Platform Log Analytics processes extracted log data for the JFrog Platform, the universal, hybrid end-to-end DevOps platform. The app provides a set of operations diagnostic dashboard views for JFrog Artifactory and JFrog Xray error tracking. Learn how the Splunk app works, with some demonstration of its use.

JFrog & Splunk - Observability for your IT Value Stream

As software is the product in many of today's businesses, the need to manage the value stream from development to production is critical to ensure consistency of information, compliance and supply chain collaboration.In order to consistently deliver high velocity and quality of applications, engineering teams require visibility into how code is moving from dev to prod in a stable and efficient manner. Just as Observability is changing the way teams managing their applications in production, the concepts of observability apply to the entire software value stream.

The concise guide to labels in Loki

A few months ago, I wrote an in-depth article describing how labels work in Loki. Here, I’m consolidating that information into a more digestible “cheat sheet.” There are some big differences in how Loki works compared to other logging systems which require a different way of thinking. This is my attempt to convey those differences as well as map out our thought process behind them. As a Loki user or operator, your goal should be to use the fewest labels possible to store your logs.

Extended retention for custom and Prometheus metrics in Cloud Monitoring

Metrics help you understand how your business and applications are performing. Longer metric retention enables quarter-over-quarter or year-over-year analysis and reporting, forecasting seasonal trends, retention for compliance, and much more. We recently announced the general availability (GA) of extended metric retention for custom and Prometheus metrics in Cloud Monitoring, increasing retention from 6 weeks to 24 months. Extended retention for custom and Prometheus metrics is enabled by default.