We’re very excited to announce that our REST Query API is now available. With this API, you can: make it easy to remotely query your log data easily integrate Logentries with third party solutions, external systems and internal tools allow… Read More
Logging user activity is a great way to understand what users are doing, and how they are using network and computing resources. Collecting data from the standpoint of a user identity or login is a great way to correlate all… Read More
In the old days when transactional behavior happened in a single domain, in step-by-step procedures, keeping track of request/response behavior was a simple undertaking. However, today one request to a particular domain can involve a myriad of subsequent asynchronous requests… Read More
I want to share something with you that is pretty amazing. But, before I do, allow me to provide the backstory.
I’ve been using Open Source Software (OSS) for a while now. I started with the big ones,… Read More
If you look at any OO-based codebase of a nontrivial size, you’ll [hopefully] find well understood behavior formalized and encapsulated through the effective use of polymorphism- either via interfaces which decouple calling code from a types’ implementation, or via sub… Read More
Working with computer logs is something of an ongoing adventure in discovery. The data from such logs is amenable to many uses and applications, particularly when it comes to monitoring and maintaining security. But even after a security breach or… Read More
Logging from the client side of a web application can seem like a challenge. The web browser exposes everything to the user. There is no way to hide anything delivered to the client from prying eyes, including your log token… Read More
The VHS tape was a thing of a magic that is alien in the world of on-demand media. It represented a promise of entertainment. A promise only realized when loading the tape into the player and pressing the play button.… Read More
In October, Rapid7 researchers uncovered a significant vulnerability in the Nine mobile application for Android. Baldly stated, this app leaks Microsoft Exchange user credentials, plus mail envelopes and attachments, mailbox synchronization data, caleandar entries and tasks to attackers. It has… Read More
The October Walkthrough Webinar was broadcasted & recorded on October 27th 2016. This broadcast included a Logentries demonstration and live Q&A.
Below is a sample of some of the questions asked by the audience following the demonstration. To try out… Read More