15 Events to Log for Better DevOps

DevOps practices are now finding their way into more and more organizations. Up to now, as the DevOps movement has started to percolate across various industries the focus has been on improving the IT department. In Logentries’ article 15 Events… Read More

Using JavaScript to interact with the REST Query API

We’re very excited to announce that our REST Query API is now available. With this API, you can: make it easy to remotely query your log data easily integrate Logentries with third party solutions, external systems and internal tools allow… Read More

Using Log Data as Forensic Evidence

Working with computer logs is something of an ongoing adventure in discovery. The data from such logs is amenable to many uses and applications, particularly when it comes to monitoring and maintaining security. But even after a security breach or… Read More

Tagged with: , ,
Posted in Log Analysis, Log Management, Monitoring, PCI, Security

Node.js as a Proxy to Logentries.com

Logging from the client side of a web application can seem like a challenge.  The web browser exposes everything to the user.  There is no way to hide anything delivered to the client from prying eyes, including your log token… Read More

Tagged with: , , , , ,
Posted in Application Performance Monitoring, Development, DevOps, How To, JavaScript, Log Management, Logentries, Scripts, Web

Goodbye to the VCR: Rewinding Down Memory Lane

The VHS tape was a thing of a magic that is alien in the world of on-demand media.  It represented a promise of entertainment. A promise only realized when loading the tape into the player and pressing the play button.… Read More

Tagged with:
Posted in Uncategorized

Widely-used Android App Leaks MS Exchange Credentials

In October, Rapid7 researchers uncovered a significant vulnerability in the Nine mobile application for Android. Baldly stated, this app leaks Microsoft Exchange user credentials, plus mail envelopes and attachments, mailbox synchronization data, caleandar entries and tasks to attackers. It has… Read More

Tagged with: , ,
Posted in Log Analysis, Log Management, Logentries, Monitoring, Security

Top 5 Questions from the October Walkthrough Webinar

The October Walkthrough Webinar was broadcasted & recorded on October 27th 2016. This broadcast included a Logentries demonstration and live Q&A.
Below is a sample of some of the questions asked by the audience following the demonstration. To try out… Read More

Tagged with: , , , ,
Posted in API, Log Management, Logentries, Webinar

Empowering Leexportpy with new services

In previous posts of this series, we have gone through how leexportpy works, how it is configured and currently supported services for transforming and pushing Logentries Query API data to other systems. When it comes to creating a new service… Read More

Tagged with: , , , , , ,
Posted in API, Application Performance Monitoring, Data visualization, Development, How To, LEQL, Log dashboards, Log Management, Logentries, Scripts

Overview of ‘online’ algorithm using Standard Deviation example

Here at Logentries we are constantly adding to the options for analysing log generated data. The query language ‘LEQL’ has a number of statistical functions and a recent addition has been the new Standard Deviation calculation.
LEQL query example
where(image=debian)… Read More

Tagged with: , ,
Posted in Data visualization, LEQL, Log Analysis

Logging OwnTracks to Logentries

A previous blog showed how MQTT logs can be sent to Logentries for storage, analysis and how those logs can be to alert on potential MQTT security threats, as well as to store and visualize sensor data. This blog follows… Read More

Tagged with: , , , , , , , ,
Posted in Data visualization, How To, IoT, JSON, LEQL, Log Analysis, Logentries, Mobile Apps, Monitoring

Logging Mosquitto Server logs (from Raspberry Pi) to Logentries

The Internet is evolving and part of this is the emerging Internet of Things (IoT). IoT allows us to use the Internet to seamlessly connect the cyberspace and real world using physical sensors at huge scale, allowing us to gather… Read More

Tagged with: , , , , , ,
Posted in How To, IoT, Log Analysis, Log dashboards, Log Management, Logentries, Monitoring, Server monitoring

Subscribe to the Blog

Categories

Archives