Blog Archives

Log Analysis for System Troubleshooting

Systems of all kinds create log data constantly and voluminously. In searching out the most compelling reasons to dig into and analyze such data, we compiled a list of seven reasons that usually drive such activity. In this blog post… Read More

Tagged with: , , , , ,
Posted in Log Analysis, Log Management, Monitoring, Server monitoring

Logging for Fun: Things You’d Never Thought to Log

I work as a consultant in the software industry.  This work affords me the opportunity to see and interact with many different teams and thus to observe prevailing trends.  Among these teams, the attitude toward logging tends to be one… Read More

Tagged with: , , ,
Posted in IoT, Log Analysis, Log Management, Monitoring

Roots and Culture: Logging and the Telephone Bill

Telephone systems were the Internet before there was an Internet.
Think about it.
By 1920 millions of people were exchanging data on a worldwide network using a device that connected on demand. Sounds like the Internet to me.
But unlike… Read More

Tagged with: ,
Posted in Business Metrics, Log Analysis, Monitoring

Logging OwnTracks to Logentries

A previous blog showed how MQTT logs can be sent to Logentries for storage, analysis and how those logs can be to alert on potential MQTT security threats, as well as to store and visualize sensor data. This blog follows… Read More

Tagged with: , , , , , , , ,
Posted in Data visualization, How To, IoT, JSON, LEQL, Log Analysis, Logentries, Mobile Apps, Monitoring

Using Event and Log Data to Assure Security and Compliance

All the way back in 2007, security industry analyst and expert Dr. Larry Ponemon of the eponymous institute wrote for Network World that “data breaches are a pervasive problem for most organizations in the United States today.” Nobody is prepared… Read More

Tagged with: , ,
Posted in Log Analysis, Log Management, Monitoring, PCI, Security, Server monitoring

Avoid These Things When Logging From Your Application

It seems almost strange to talk about avoiding things while logging.  After all, logging is your last line of defense or your salvation in many cases.  Some crazy bug in the field that shows up every third full moon?  An… Read More

Tagged with: , ,
Posted in Log Management, Logentries, Monitoring

Logging the Lights in Your Home

It’s all the rage these days under the general heading of “Internet of Things” (IoT), but I have been a home automation enthusiast for more than 10 years now.  In the interceding time, I’ve done experiments and written about the… Read More

Tagged with: , ,
Posted in Cloud, Community, IoT, Log Management, Logentries

How Audit Logs Help Confirm and Correct Security Policy

There are many possible definitions for the term “security policy,” but all of them share certain elements in common. A security policy should lay out what assets, both physical and digital, an organization wishes to protect. It should explain what… Read More

Tagged with: , , , ,
Posted in Log Analysis, Log Management, Security

Signal AND Noise The Best of All Worlds for Logging

One of the absolute, classic pieces of advice that you’ll hear when it comes to logging is what I think of as the iconic Goldilocks logging advice.  It goes something like this.
When it comes to logging, you don’t want… Read More

Tagged with: , , ,
Posted in Alerts, Application Performance Monitoring, Log Management, Logentries, Monitoring, Search

Monitoring SNS Activity Using a Lambda Function and Logentries

Amazon Web Services Lambda functions are very cool. A Lambda function is a feature in Amazon Web Services that allows you to put a discrete piece of computing logic up in The Cloud and then access that logic to meet… Read More

Tagged with: , , , , ,
Posted in AWS, Cloud, Development, DevOps, How To, Logentries, Python, Uncategorized

Subscribe to the Blog

Categories

Archives