Blog Archives

Using Log Data as Forensic Evidence

Working with computer logs is something of an ongoing adventure in discovery. The data from such logs is amenable to many uses and applications, particularly when it comes to monitoring and maintaining security. But even after a security breach or… Read More

Tagged with: , ,
Posted in Log Analysis, Log Management, Monitoring, PCI, Security

Widely-used Android App Leaks MS Exchange Credentials

In October, Rapid7 researchers uncovered a significant vulnerability in the Nine mobile application for Android. Baldly stated, this app leaks Microsoft Exchange user credentials, plus mail envelopes and attachments, mailbox synchronization data, caleandar entries and tasks to attackers. It has… Read More

Tagged with: , ,
Posted in Log Analysis, Log Management, Logentries, Monitoring, Security

Logging OwnTracks to Logentries

A previous blog showed how MQTT logs can be sent to Logentries for storage, analysis and how those logs can be to alert on potential MQTT security threats, as well as to store and visualize sensor data. This blog follows… Read More

Tagged with: , , , , , , , ,
Posted in Data visualization, How To, IoT, JSON, LEQL, Log Analysis, Logentries, Mobile Apps, Monitoring

Logging Mosquitto Server logs (from Raspberry Pi) to Logentries

The Internet is evolving and part of this is the emerging Internet of Things (IoT). IoT allows us to use the Internet to seamlessly connect the cyberspace and real world using physical sensors at huge scale, allowing us to gather… Read More

Tagged with: , , , , , ,
Posted in How To, IoT, Log Analysis, Log dashboards, Log Management, Logentries, Monitoring, Server monitoring

Using Event and Log Data to Assure Security and Compliance

All the way back in 2007, security industry analyst and expert Dr. Larry Ponemon of the eponymous institute wrote for Network World that “data breaches are a pervasive problem for most organizations in the United States today.” Nobody is prepared… Read More

Tagged with: , ,
Posted in Log Analysis, Log Management, Monitoring, PCI, Security, Server monitoring

Avoid These Things When Logging From Your Application

It seems almost strange to talk about avoiding things while logging.  After all, logging is your last line of defense or your salvation in many cases.  Some crazy bug in the field that shows up every third full moon?  An… Read More

Tagged with: , ,
Posted in Log Management, Logentries, Monitoring

Using Logentries With Angular v1.5

(The post assumes at least a basic knowledge of Angular.  Angular is a very opinionated framework so make sure you have some experience with Angular before following the instructions presented below.)
Logentries can integrate into whatever Javascript framework you want… Read More

Tagged with: , , , ,
Posted in Angular, Application Performance Monitoring, Development, How To, JavaScript, Log Management, Logentries, Monitoring

Backup Log Checks and What They Can Tell You

There is simply no substitute for a recent, accurate backup when it comes to recovering from file or system damage or outages. But that backup must be complete and error-free to make a full recovery possible. That’s why inspecting log… Read More

Tagged with: , , , ,
Posted in Application Performance Monitoring, DevOps, Linux, Log Analysis, Monitoring, Server monitoring, Windows

Keep Your Code Clean while Logging

In my consultancy practice, one of the things that I do most frequently is help teams write so-called “clean code.”  Usually, this orients around test-driven development (TDD) and writing code that is easily maintained via regression tests and risk-free refactoring.  … Read More

Tagged with: , , , ,
Posted in Application Performance Monitoring, Development, Log Management, Monitoring

Rsyslog TCP/IP log forwarding to Logentries with Netscaler

This guest post originally appeared on IBM developerWorks.
Overview
The aim of the article is to cover technical areas on how to load balance Rsyslog TCP/IP traffic from Redhat Server to Logentries (a third party solutions for real time log… Read More

Tagged with: , , , ,
Posted in DevOps, How To, Linux, Log Management, Logentries, Monitoring, Server monitoring

Subscribe to the Blog

Categories

Archives