Blog Archives

Network Administrator’s Guide to Surviving an Audit: During the Audit

Last time we talked about how to prepare for an audit. In this installment we’ll cover what to do once the audit begins. Let’s assume that you’re pretty well prepared. You’ve done your homework and know pretty much what to… Read More

Tagged with: ,
Posted in Security

Legacy apps in the data center, today’s apps in the cloud

Have you found that your organization is developing new applications that are cloud-based, but unable to move away from some established legacy systems? You aren’t alone. This legacy/cloud hybrid environment is far more common than you would expect. And when… Read More

Tagged with: ,
Posted in Cloud, Development, DevOps, Web

Network Administrator’s Guide to Surviving an Audit: Preparation

Sooner or later, your organization will likely be the subject of an IT audit. But as ominous as that sounds, it doesn’t have to be something to dread. If you’re a network administrator, you’ll have a specific role in an… Read More

Tagged with: ,
Posted in PCI, Security

Never type a search query again!

Introducing Visual Search
In our never-ending effort to help you wrangle your infrastructure, we are constantly improving and adding new functionality to Logentries.  In that spirit, today we are happy to announce Visual Search. Visual Search is truly a one… Read More

Posted in Data visualization, Feature, Logentries, Search

Java 8 – Lazy argument evaluation

Overview
“I will always choose a lazy person to do a difficult job. Because he will find an easy way to do it” – Bill Gates
Lazy evaluation is an evaluation strategy which delays the evaluation of an expression until… Read More

Tagged with: , , ,
Posted in Application Performance Monitoring, Development, Java, Tips & Tricks

Top 5 Questions from the October Walkthrough Webinar

The October Walkthrough Webinar was broadcasted & recorded on October 27th 2016. This broadcast included a Logentries demonstration and live Q&A.
Below is a sample of some of the questions asked by the audience following the demonstration. To try out… Read More

Tagged with: , , , ,
Posted in API, Log Management, Logentries, Webinar

Empowering Leexportpy with new services

In previous posts of this series, we have gone through how leexportpy works, how it is configured and currently supported services for transforming and pushing Logentries Query API data to other systems. When it comes to creating a new service… Read More

Tagged with: , , , , , ,
Posted in API, Application Performance Monitoring, Data visualization, Development, How To, LEQL, Log dashboards, Log Management, Logentries, Scripts

Overview of ‘online’ algorithm using Standard Deviation example

Here at Logentries we are constantly adding to the options for analysing log generated data. The query language ‘LEQL’ has a number of statistical functions and a recent addition has been the new Standard Deviation calculation.
LEQL query example
where(image=debian)… Read More

Tagged with: , ,
Posted in Data visualization, LEQL, Log Analysis

Logging OwnTracks to Logentries

A previous blog showed how MQTT logs can be sent to Logentries for storage, analysis and how those logs can be to alert on potential MQTT security threats, as well as to store and visualize sensor data. This blog follows… Read More

Tagged with: , , , , , , , ,
Posted in Data visualization, How To, IoT, JSON, LEQL, Log Analysis, Logentries, Mobile Apps, Monitoring

Logging Mosquitto Server logs (from Raspberry Pi) to Logentries

The Internet is evolving and part of this is the emerging Internet of Things (IoT). IoT allows us to use the Internet to seamlessly connect the cyberspace and real world using physical sensors at huge scale, allowing us to gather… Read More

Tagged with: , , , , , ,
Posted in How To, IoT, Log Analysis, Log dashboards, Log Management, Logentries, Monitoring, Server monitoring

Subscribe to the Blog

Categories

Archives