Operations | Monitoring | ITSM | DevOps | Cloud

Logging

The latest News and Information on Log Management, Log Analytics and related technologies.

Is Waiting for the Thaw Unbear-able?

It’s not new news that organizations are producing more data than ever. But, in order to take advantage of this data, it needs to be collected, stored, retained, and then, at some point, analyzed. Most analysis tools also act as the retention point for this data. While this may (at first) appear to be the best option for performance, it quickly creates significant problems. First, those systems were never designed for the scale of today’s growing volume of data, currently at a 28% CAGR.

Critical Automation: Anomaly Detection for Application Observability

There’s no debate — in our increasingly AI-driven, lean and data-heavy world, automating key tasks to increase effectiveness and efficiency is the ultimate name of the game. No matter what job you hold today, you’re likely being pushed to not only do more with less, but also perform your work with a tighter focus on specific outcomes and SLOs.

Log Management Made Easy: Top 10 Logs Monitoring Solutions

In contemporary enterprise operations, log management tools have become indispensable for optimizing performance. Among these tools, selecting one with a proficient logs user interface (UI) holds paramount importance. A quality log management tool not only gathers logs but also presents them in a well-organized manner, facilitating easy interpretation for the user.

Beyond Logs: Navigating Entity Behavior in Splunk Platform

Identifying bad actors within your organization often feels like a complicated game of hide and seek. A common comparison is that it's akin to finding a needle in a haystack. So, if the bad actor represents the 'needle' and your organization the 'haystack,' how would you uncover these bad actors? Perhaps the quickest way to find the needle is by burning the haystack. Alternatively, dumping the hay into a pool of water and waiting for the needle to sink to the bottom could also work.

Top 5 Outcomes CIOs Need to Accomplish by 2025: Driving Business Value Through Technology

In January 2024, I published findings from some of my recent research as, “Top 5 Outcomes CIOs Need to Achieve by 2025: Driving Business Value Through Technology.” By focusing on these five key outcomes, CIOs can ensure that their technology investments directly contribute to business growth, resilience, and competitive advantage in the years leading up to 2025.

OpenTelemetry in Production: A Primer

At observIQ, we’re big believers and contributors to the OpenTelemetry project. In 2023, we saw project awareness reach an all-time high as we attended tradeshows like KubeCon and Monitorama. The project’s benefits of flexibility, performance, and vendor agnosticism have been making their rounds; we’ve seen a groundswell of customer interest.

Graylog Parsing Rules and AI Oh My!

In the log aggregation game, the biggest difficulty you face can be setting up parsing rules for your logs. To qualify this statement: simply getting log files into Graylog is easy. Graylog also has out-of-the-box parsing of a wide variety of common log sources, so if your logs fall into one of the many categories of log for which there is either a dedicated Input; a dedicated Illuminate component; or that uses a defined Syslog format; then yes, parsing logs is also easy.
Sponsored Post

Threat Hunting Frameworks and Methodologies: An Introductory Guide

Establishing an effective cyber threat hunting program is among the top priorities of enterprise security leaders seeking a proactive approach to detecting and counteracting potential threats. Furthermore, implementing a proactive threat hunting program, security teams that leverage formalized frameworks or threat hunting methodologies are far more likely to detect vulnerabilities or in-process malicious activities in their environments than those that do not. However, data from a 2023 threat hunting survey revealed that while 73% of organizations have adopted a defined threat hunting framework, only 38% actually follow it.

The Top 10 Server Monitoring Tools

As organizations and their IT infrastructure become more complex the necessity for effective server monitoring grows. Companies are deciding to operate extensive server networks, utilizing both cloud infrastructure and on-premises data centers due to the ever-increasing demand. Today’s users demand as good as 100% uptime for the services they use, meaning optimal and well–established network connections are vital in order to handle large amounts of users and transactions.