Blog Archives

Logging OwnTracks to Logentries

A previous blog showed how MQTT logs can be sent to Logentries for storage, analysis and how those logs can be to alert on potential MQTT security threats, as well as to store and visualize sensor data. This blog follows… Read More

Tagged with: , , , , , , , ,
Posted in Data visualization, How To, IoT, JSON, LEQL, Log Analysis, Logentries, Mobile Apps, Monitoring

Using Event and Log Data to Assure Security and Compliance

All the way back in 2007, security industry analyst and expert Dr. Larry Ponemon of the eponymous institute wrote for Network World that “data breaches are a pervasive problem for most organizations in the United States today.” Nobody is prepared… Read More

Tagged with: , ,
Posted in Log Analysis, Log Management, Monitoring, PCI, Security, Server monitoring

Avoid These Things When Logging From Your Application

It seems almost strange to talk about avoiding things while logging.  After all, logging is your last line of defense or your salvation in many cases.  Some crazy bug in the field that shows up every third full moon?  An… Read More

Tagged with: , ,
Posted in Log Management, Logentries, Monitoring

Logging the Lights in Your Home

It’s all the rage these days under the general heading of “Internet of Things” (IoT), but I have been a home automation enthusiast for more than 10 years now.  In the interceding time, I’ve done experiments and written about the… Read More

Tagged with: , ,
Posted in Cloud, Community, IoT, Log Management, Logentries

How Audit Logs Help Confirm and Correct Security Policy

There are many possible definitions for the term “security policy,” but all of them share certain elements in common. A security policy should lay out what assets, both physical and digital, an organization wishes to protect. It should explain what… Read More

Tagged with: , , , ,
Posted in Log Analysis, Log Management, Security

Signal AND Noise The Best of All Worlds for Logging

One of the absolute, classic pieces of advice that you’ll hear when it comes to logging is what I think of as the iconic Goldilocks logging advice.  It goes something like this.
When it comes to logging, you don’t want… Read More

Tagged with: , , ,
Posted in Alerts, Application Performance Monitoring, Log Management, Logentries, Monitoring, Search

Monitoring SNS Activity Using a Lambda Function and Logentries

Amazon Web Services Lambda functions are very cool. A Lambda function is a feature in Amazon Web Services that allows you to put a discrete piece of computing logic up in The Cloud and then access that logic to meet… Read More

Tagged with: , , , , ,
Posted in AWS, Cloud, Development, DevOps, How To, Logentries, Python, Uncategorized

Introducing LEQL: BYTES

Take a Byte out of Anomalous Log Volumes
One of the most common questions asked by users of our Log Management platform is “where is my log volume coming from?”  There are a number of ways to interpret this question. … Read More

Tagged with: , , , ,
Posted in Alerts, LEQL, Log Analysis, Log Management, Logentries

Now Available: REST Query API

Our new REST Query API is now included as part of the Logentries Team plan. Complimentary access to the REST Query API for all active Starter and Pro accounts is also available for a limited time.
Don’t have an account… Read More

Tagged with: , , ,
Posted in API, Data visualization, LEQL, Log Management, Logentries

Using JavaScript to interact with the REST Query API

We’re very excited to announce that our REST Query API is now available. With this API, you can:

make it easy to remotely query your log data
easily integrate Logentries with third party solutions, external systems and internal tools
allow… Read More

Tagged with: , , , ,
Posted in API, Feature, How To, JavaScript, LEQL, Tips & Tricks

Subscribe to the Blog

Categories

Archives