Never type a search query again!

Introducing Visual Search In our never-ending effort to help you wrangle your infrastructure, we are constantly improving and adding new functionality to Logentries.  In that spirit, today we are happy to announce Visual Search. Visual Search is truly a one… Read More

15 Events to Log for Better DevOps

DevOps practices are now finding their way into more and more organizations. Up to now, as the DevOps movement has started to percolate across various industries the focus has been on improving the IT department. In Logentries’ article 15 Events… Read More

5 Rules of Pair Programming Etiquette

I like Pair Programming. I’ve been doing it episodically for about 10 years. Whenever I’ve pair programmed, at the end of a session, I’ve always walked away a better developer than when I started.
However, the practice can be expensive… Read More

Tagged with: ,
Posted in Development

3 Predictions for Development in the Age of Serverless Computing

Probably the biggest change that has happened in my lifetime of programming is the transformation from  creating code that is meant to run on known, tangible hardware to making code that runs on the Cloud. We’ve gone from server based… Read More

Tagged with: ,
Posted in Cloud, DevOps, Scripts, Uncategorized

Java 8 – Lazy argument evaluation

Overview
“I will always choose a lazy person to do a difficult job. Because he will find an easy way to do it” – Bill Gates
Lazy evaluation is an evaluation strategy which delays the evaluation of an expression until… Read More

Tagged with: , , ,
Posted in Application Performance Monitoring, Development, Java, Tips & Tricks

Logs To Understand User Activity and Behavior

Logging user activity is a great way to understand what users are doing, and how they are using network and computing resources. Collecting data from the standpoint of a user identity or login is a great way to correlate all… Read More

Tagged with: , , ,
Posted in Log Analysis, Security

The Value of Correlation IDs

In the old days when transactional behavior happened in a single domain, in step-by-step procedures, keeping track of request/response behavior was a simple undertaking. However, today one request to a particular domain can involve a myriad of subsequent asynchronous requests… Read More

Tagged with: , , , ,
Posted in Application Performance Monitoring, Development, Log Analysis, Log Management, Server monitoring, Web

The Generosity of Thought: Caring and Sharing in the Open Source Community

I want to share something with you that is pretty amazing. But, before I do, allow me to provide the backstory.
The Backstory
I’ve been using Open Source Software (OSS) for a while now. I started with the big ones,… Read More

Posted in Uncategorized

Solving the expression problem

If you look at any OO-based codebase of a nontrivial size, you’ll [hopefully] find well understood behavior formalized and encapsulated through the effective use of polymorphism- either via interfaces which decouple calling code from a types’ implementation, or via sub… Read More

Tagged with: , , ,
Posted in Development

Using Log Data as Forensic Evidence

Working with computer logs is something of an ongoing adventure in discovery. The data from such logs is amenable to many uses and applications, particularly when it comes to monitoring and maintaining security. But even after a security breach or… Read More

Tagged with: , ,
Posted in Log Analysis, Log Management, Monitoring, PCI, Security

Node.js as a Proxy to Logentries.com

Logging from the client side of a web application can seem like a challenge.  The web browser exposes everything to the user.  There is no way to hide anything delivered to the client from prying eyes, including your log token… Read More

Tagged with: , , , , ,
Posted in Application Performance Monitoring, Development, DevOps, How To, JavaScript, Log Management, Logentries, Scripts, Web

Subscribe to the Blog

Categories

Archives