15 Events to Log for Better DevOps

DevOps practices are now finding their way into more and more organizations. Up to now, as the DevOps movement has started to percolate across various industries the focus has been on improving the IT department. In Logentries’ article 15 Events… Read More

Using JavaScript to interact with the REST Query API

We’re very excited to announce that our REST Query API is now available. With this API, you can: make it easy to remotely query your log data easily integrate Logentries with third party solutions, external systems and internal tools allow… Read More

Logs To Understand User Activity and Behavior

Logging user activity is a great way to understand what users are doing, and how they are using network and computing resources. Collecting data from the standpoint of a user identity or login is a great way to correlate all… Read More

Tagged with: , , ,
Posted in Log Analysis, Security

The Value of Correlation IDs

In the old days when transactional behavior happened in a single domain, in step-by-step procedures, keeping track of request/response behavior was a simple undertaking. However, today one request to a particular domain can involve a myriad of subsequent asynchronous requests… Read More

Tagged with: , , , ,
Posted in Application Performance Monitoring, Development, Log Analysis, Log Management, Server monitoring, Web

The Generosity of Thought: Caring and Sharing in the Open Source Community

I want to share something with you that is pretty amazing. But, before I do, allow me to provide the backstory.
The Backstory
I’ve been using Open Source Software (OSS) for a while now. I started with the big ones,… Read More

Posted in Uncategorized

Solving the expression problem

If you look at any OO-based codebase of a nontrivial size, you’ll [hopefully] find well understood behavior formalized and encapsulated through the effective use of polymorphism- either via interfaces which decouple calling code from a types’ implementation, or via sub… Read More

Tagged with: , , ,
Posted in Development

Using Log Data as Forensic Evidence

Working with computer logs is something of an ongoing adventure in discovery. The data from such logs is amenable to many uses and applications, particularly when it comes to monitoring and maintaining security. But even after a security breach or… Read More

Tagged with: , ,
Posted in Log Analysis, Log Management, Monitoring, PCI, Security

Node.js as a Proxy to Logentries.com

Logging from the client side of a web application can seem like a challenge.  The web browser exposes everything to the user.  There is no way to hide anything delivered to the client from prying eyes, including your log token… Read More

Tagged with: , , , , ,
Posted in Application Performance Monitoring, Development, DevOps, How To, JavaScript, Log Management, Logentries, Scripts, Web

Goodbye to the VCR: Rewinding Down Memory Lane

The VHS tape was a thing of a magic that is alien in the world of on-demand media.  It represented a promise of entertainment. A promise only realized when loading the tape into the player and pressing the play button.… Read More

Tagged with:
Posted in Uncategorized

Widely-used Android App Leaks MS Exchange Credentials

In October, Rapid7 researchers uncovered a significant vulnerability in the Nine mobile application for Android. Baldly stated, this app leaks Microsoft Exchange user credentials, plus mail envelopes and attachments, mailbox synchronization data, caleandar entries and tasks to attackers. It has… Read More

Tagged with: , ,
Posted in Log Analysis, Log Management, Logentries, Monitoring, Security

Top 5 Questions from the October Walkthrough Webinar

The October Walkthrough Webinar was broadcasted & recorded on October 27th 2016. This broadcast included a Logentries demonstration and live Q&A.
Below is a sample of some of the questions asked by the audience following the demonstration. To try out… Read More

Tagged with: , , , ,
Posted in API, Log Management, Logentries, Webinar

Subscribe to the Blog

Categories

Archives