Blog Archives

Logging in a Software Defined Network

Background
This blog will give an overview of Software Defined Networks (SDN), present some suggestions for logging in an SDN and finally present an overview of some research work we are doing on SDN logging.
If we consider a Software… Read More

Tagged with: , , ,
Posted in Cloud, DevOps, Log Management, Monitoring, Virtualization

Log Analysis for System Troubleshooting

Systems of all kinds create log data constantly and voluminously. In searching out the most compelling reasons to dig into and analyze such data, we compiled a list of seven reasons that usually drive such activity. In this blog post… Read More

Tagged with: , , , , ,
Posted in Log Analysis, Log Management, Monitoring, Server monitoring

Logging for Fun: Things You’d Never Thought to Log

I work as a consultant in the software industry.  This work affords me the opportunity to see and interact with many different teams and thus to observe prevailing trends.  Among these teams, the attitude toward logging tends to be one… Read More

Tagged with: , , ,
Posted in IoT, Log Analysis, Log Management, Monitoring

The Value of Correlation IDs

In the old days when transactional behavior happened in a single domain, in step-by-step procedures, keeping track of request/response behavior was a simple undertaking. However, today one request to a particular domain can involve a myriad of subsequent asynchronous requests… Read More

Tagged with: , , , ,
Posted in Application Performance Monitoring, Development, Log Analysis, Log Management, Server monitoring, Web

Node.js as a Proxy to Logentries.com

Logging from the client side of a web application can seem like a challenge.  The web browser exposes everything to the user.  There is no way to hide anything delivered to the client from prying eyes, including your log token… Read More

Tagged with: , , , , ,
Posted in Application Performance Monitoring, Development, DevOps, How To, JavaScript, Log Management, Logentries, Scripts, Web

Widely-used Android App Leaks MS Exchange Credentials

In October, Rapid7 researchers uncovered a significant vulnerability in the Nine mobile application for Android. Baldly stated, this app leaks Microsoft Exchange user credentials, plus mail envelopes and attachments, mailbox synchronization data, caleandar entries and tasks to attackers. It has… Read More

Tagged with: , ,
Posted in Log Analysis, Log Management, Logentries, Monitoring, Security

Top 5 Questions from the October Walkthrough Webinar

The October Walkthrough Webinar was broadcasted & recorded on October 27th 2016. This broadcast included a Logentries demonstration and live Q&A.
Below is a sample of some of the questions asked by the audience following the demonstration. To try out… Read More

Tagged with: , , , ,
Posted in API, Log Management, Logentries, Webinar

Empowering Leexportpy with new services

In previous posts of this series, we have gone through how leexportpy works, how it is configured and currently supported services for transforming and pushing Logentries Query API data to other systems. When it comes to creating a new service… Read More

Tagged with: , , , , , ,
Posted in API, Application Performance Monitoring, Data visualization, Development, How To, LEQL, Log dashboards, Log Management, Logentries, Scripts

Logging OwnTracks to Logentries

A previous blog showed how MQTT logs can be sent to Logentries for storage, analysis and how those logs can be to alert on potential MQTT security threats, as well as to store and visualize sensor data. This blog follows… Read More

Tagged with: , , , , , , , ,
Posted in Data visualization, How To, IoT, JSON, LEQL, Log Analysis, Logentries, Mobile Apps, Monitoring

Logging Mosquitto Server logs (from Raspberry Pi) to Logentries

The Internet is evolving and part of this is the emerging Internet of Things (IoT). IoT allows us to use the Internet to seamlessly connect the cyberspace and real world using physical sensors at huge scale, allowing us to gather… Read More

Tagged with: , , , , , ,
Posted in How To, IoT, Log Analysis, Log dashboards, Log Management, Logentries, Monitoring, Server monitoring

Subscribe to the Blog

Categories

Archives