Blog Archives

Log Analysis for System Troubleshooting

Systems of all kinds create log data constantly and voluminously. In searching out the most compelling reasons to dig into and analyze such data, we compiled a list of seven reasons that usually drive such activity. In this blog post… Read More

Tagged with: , , , , ,
Posted in Log Analysis, Log Management, Monitoring, Server monitoring

Logging for Fun: Things You’d Never Thought to Log

I work as a consultant in the software industry.  This work affords me the opportunity to see and interact with many different teams and thus to observe prevailing trends.  Among these teams, the attitude toward logging tends to be one… Read More

Tagged with: , , ,
Posted in IoT, Log Analysis, Log Management, Monitoring

Client Side Logging In Javascript

Developers are writing Javascript applications of increasing complexity designed to run in web browsers, on desktops, and on servers.  Javascript applications have reached a level of maturity that means they are running important business operations.  They must be more maintainable… Read More

Tagged with: , , , ,
Posted in Application Performance Monitoring, Cloud, Development, JavaScript, Log Management, Logentries, Uncategorized

The 4 Steps for Creating a Log Enabled Marketing Campaign

Typically, most logging activity in the online world is concerned with collecting information about an enterprise’s digital infrastructure. Machine logs, application logs, network logs, database logs, access logs are a few examples of such activity. However, as marketing campaigns become… Read More

Tagged with: , , ,
Posted in How To, Log Analysis, Log Management, Logentries, Tips & Tricks, Uncategorized

7 Rules for Using Log Data Effectively in a Retrospective

Log data can be an indispensable tool for doing an effective Retrospective following a technical disaster. Yet, often the data is misused. And many think that the entire Retrospective process is flawed altogether. More often than not Retrospectives, also known… Read More

Tagged with: , , , , , , , , ,
Posted in Application Performance Monitoring, Log Analysis, Tips & Tricks

Logging for Unikernels

Unikernels are the next step in virtualized computing. There is a lot of hubbub right now in the tech-o-sphere about unikernels. In fact, in many circles unikernels are thought to be the Next Big Thing. There is a lot of… Read More

Tagged with: , , , , , , , , ,
Posted in Docker

The Role of Log Files in Experiments

You have heard, no doubt, of the Lean Startup.  If you need a refresher to place the name, it’s a book, but it’s also a business trend with such momentum as to have a website advertising it as a “movement.” … Read More

Tagged with: , , , , ,
Posted in Application Performance Monitoring, Data visualization, Log Analysis, Log Management

Infographic: Log Management & Analytics at a Glance

Logentries surveyed over 400 IT professionals about their views of log management and analytics. We found that many people are planning on using and investing in public cloud infrastructure such as AWS, Google, and Azure in 2016.
Who took the… Read More

Tagged with: , , , , , , , ,
Posted in AWS, Cloud, Containers, DevOps, Docker, Infographic, Log Management, Server monitoring

IOT made real – Using TI SensorTag data with Logentries and NodeRed

Learn how to send IoT Data from the TI CC 2650 SensorTag to Logentries (using Node-Red).
This is the first of a series of IoT blogs that show you how easy it can be to integrate a range of real… Read More

Tagged with: , ,
Posted in How To, IoT, Log Analysis, Logentries

Troubleshooting with Nexpose Logs

Nexpose is the industry standard in Vulnerability Management, giving you the confidence you need to understand your ever-changing attack surface, focus on what matters, and create better security outcomes.… Read More

Tagged with: , , , ,
Posted in How To, Log Analysis

Subscribe to the Blog