Securing your Metasploit Logs

Metasploit, backed by a community of 200,000 users and contributors is the most impactful penetration testing solution on the planet. With it, uncover weaknesses in your defenses, focus on the highest risks, and improve your security outcomes. Your Metasploit Pro… Read More

Analyzing ELB Log Data

Thanks to some slick work from our engineering team, we have recently released a lightweight python script that will allow you to pull your Elastic Load Balancer logs from S3 into Logentries. In this implementation, we use AWS Lambda and… Read More

Using Logs for Security & Compliance: Part 2

security-white-paper-part-2

This 3-part series explores the critical role logs play in maintaining regulatory compliances and provides specific examples of known events to look for an how to evaluate different compliance tools. To download the free 24-page white paper, click here.

For… Read More

Posted in Uncategorized

Combining AngularJS and ReactJS for better applications

combining-angularJS-and-reactJS-for-better-applications

If you’re a JavaScript developer, and know a little bit about the current state of JS development, then you’re probably well aware that there seems to be a new JS framework popping up every day. It’s easy to feel overwhelmed… Read More

Posted in Angular, How To, JavaScript, React

Monitoring Business Critical Events Webinar with VictorOps

monitoring-business-critical-events-webinar-with-victorOps

How the most important metrics aren’t being monitored nearly enough
Many of today’s organizations have an established strategy for monitoring their IT environments for issues with performance, security and resource utilization. In many cases, performance is monitored and issues are… Read More

Posted in Webinar

January Webinar Recap: 2016 Best Logging Practices

jan-2016-webinar-recap

In our January webinar, broadcasted & recorded on January 28th 2016, we shared 5 best practices for log management & analytics in 2016 that were inspired by the most common questions we received in 2015.
Below is a brief summary… Read More

Posted in How To, Webinar

Securing your Metasploit Logs

securing-your-metasploit-logs

Metasploit, backed by a community of 200,000 users and contributors is the most impactful penetration testing solution on the planet. With it, uncover weaknesses in your defenses, focus on the highest risks, and improve your security outcomes.
Your Metasploit Pro… Read More

Posted in Feature, How To, Security

Using Logs for Security & Compliance: Part 1

security-white-paper

This 3-part series explores the critical role logs play in maintaining regulatory compliances and provides specific examples of known events to look for an how to evaluate different compliance tools. To download the free 24-page white paper, click here.

For… Read More

Posted in Security

Analyzing ELB Log Data

analyizing-elb-logs-data

Thanks to some slick work from our engineering team, we have recently released a lightweight python script that will allow you to pull your Elastic Load Balancer logs from S3 into Logentries.
In this implementation, we use AWS Lambda and… Read More

Posted in AWS, Cloud, Feature, How To

Introducing a Buildbot status plugin for pushing status updates to Logentries

build-bot-intergration

Buildbot is a framework for building continuous deployment and integration systems, it is highly flexible and is written in python. It is also a mature system which a number of large projects use e.g. Mozilla, Chromium, Python – see trac.buildbot.net/wiki/SuccessStories… Read More

Posted in How To, Monitoring

How to Log Messages from Slack

how-to-log-from-slack

We recently added support for unedited HTTP logging in Logentries. This means you can send us log data via HTTPS drain (from heroku), or via any webhook you want.
One webhook that we’ve been looking to log for a while… Read More

Posted in How To, Monitoring

Subscribe to the Blog

Categories

Archives