5 min
Log Management
Log Search Simplified
Hi, I'm Laura, UX Designer at Logentries and today I'm going to discuss how just
about anyone can use Logentries to search and analyze their log data no matter
what their job title or technical skill level.
What is Logentries?
At Logentries, the team works tirelessly to provide an easy to use log
management service [https://logentries.com/?CS=R7blog] that allows users to
stream their logs from just about anything. Logentries can accept data from
almost any device that generates log data, inclu
3 min
Log Management
Using Log Data as Forensic Evidence
This is a guest post by Ed Tittel. Ed, a regular contributor to
blog.logentries.com [https://blog.logentries.com/], has been writing about
information security topics since the mid-1990s. He contributed to the first
five editions of the CISSP Study Guide (Sybex, 6e, 2012, ISBN:
978-1-119-31427-3) and to two editions of Computer Forensics JumpStart (Sybex,
2e, 2011, ISBN: 978-0-470-93166-0), and still writes and blogs regularly on
security topics for websites including Tom's IT Pro, GoCertify.co
5 min
PCI
Seven Ways InsightIDR Helps Maintain PCI Compliance
If your company processes credit card transactions, you must be compliant with
the Payment Card Industry Data Security Standard, or PCI DSS
[https://www.pcisecuritystandards.org/documents/PCI_DSS-QRG-v3_2_1.pdf]. Any
entity that stores, processes, or transmits cardholder data must abide by these
requirements, which provide best practices for securing your cardholder data
environment (CDE) [https://www.rapid7.com/solutions/compliance/pci-dss/].
Rapid7 InsightVM [https://www.rapid7.com/products/i
5 min
Log Management
If You Work In Operations, Your Security Team Needs The Logs, Too
This post is the final in a series examining the roles of search and analytics
in the incident-detection-to-response lifecycle. To read the previous six, click
one [/2015/10/21/search-will-always-be-a-part-of-incident-investigations], two
[/2015/10/29/whether-or-not-siem-died-the-problems-remain], three
[/2015/11/05/investigating-an-incident-doesnt-end-at-the-perimeter], four
[/2015/11/11/making-sure-search-is-not-your-incident-response-bottleneck], five
[/2015/11/19/siems-dont-detect-attacks-a
6 min
Log Management
10 Best Practices for Log Management and Analytics
Introduction
Today’s Log Management and Analytics Challenges
Within the last decade, the advancement of distributed systems has introduced
new complexities in managing log data. Today’s systems can include thousands of
server instances or micro- service containers, each generating its own log data.
With the rapid emergence and dominance of cloud-based systems, we have witnessed
explosive growth in machine-generated log data. As a result, log management has
become a staple in modern IT operatio
1 min
Logentries
Logentries Joins the Rapid7 Family
I'm very excited today to join the Rapid7 family. The acquisition is good news
for Logentries customers, Rapid7 customers and all of our employees. It means
that great minds and innovative technology have come together to solve some of
our thorniest IT and security challenges.
The Logentries team has been on a mission over the last few years -- Revealing
the Power of Log Data to the World. While pursuing our mission, I am often asked
why log data has become so valuable. The answer is simple: l
2 min
Logentries
Why we're welcoming Logentries to the Rapid7 family - a story of data and analytics
Those that follow Rapid7 will know that we talk a great deal about our vision of
delivering security data and analytics to our customers to enable an active,
analytics-driven approach to cyber security. I'm excited to let you know that
today we're making an important addition to the Rapid7 family that will help us
advance this vision even further… we are acquiring the world-class, cloud-based
log management and search technology company, Logentries.
Organizations need real mastery of the inform
9 min
Log Management
Q & A from the Incident Response & Investigation Webcast: "Storming the Breach, Part 1: Initial Infection Vector"
The recent webcast “Storming the Breach, Part 1: Initial Infection Vector
[https://information.rapid7.com/storming-the-breach-part-1-initial-infection-vector.html?CS=blog]
”, with Incident Response experts Wade Woolwine [/author/wade-woolwine] and Mike
Scutt sparked so many great questions from our live attendees that we didn't
have time to get through all of them! Our presenters took the time to answer
additional questions after the fact... so read on for the overflow Q&A on tips
and tricks for
3 min
IT Ops
Log Analysis for Orchestration Change Management
Are you suffering from server sprawl? You might be and don’t even know it.
Server sprawl occurs when there are an unknown number of rogue VMs; VMs with
unknown workload, owners, or purpose. And no one is fearless enough to delete
or suspend them. Orchestration tools make creating new nodes so easy that almost
every organization who uses them is suffering from server sprawl…at a high price
and lots of confusion.
[/content/images/le-img/2015/04/log-analysis-for-orchestration-change-management-
5 min
IT Ops
In the Log Management World: Are you a Fox or Hedgehog?
I’ve recently been reading Nate Silver’s book, “The Signal and the Noise.” In
the book, Silver looks at a number of areas where predictions have been made and
considers how successful they have been, as well as the reasons why they have
been accurate (or not).
I couldn’t help but draw the similarities how most companies use log management
tools [https://logentries.com/doc/log-management/] today.
Silver’s particular interests are political forecasting (see
www.fivethirtyeight.com [http://www.
3 min
IT Ops
Traditional Log Management Is Dead. Long Live Autonomic Analytics!
In this new era of cloud computing, faster and cheaper are not enough. The
modern Ops “toolkit” needs a log analytics service built for cloud-based
environments that offers easy log data centralization, autonomic analysis, and a
real-time monitoring service for connecting distributed systems and teams.
The rapid emergence and dominance of cloud-based systems have contributed to an
explosive growth of machine generated log data. We have heard from our
community
of more than 25,000 IT and Dev O
3 min
IT Ops
Why we love log management (and you should too)
It doesn’t matter if your title puts you in Ops, Dev, or DevOps, being able to
track down the big insights from your data is the secret-sauce every engineer is
looking for. Collecting the data is a step in the right direction, but
organizing, tagging, monitoring, and reporting from the data provides the
insights necessary to make business decisions.
Log data is a huge piece of that puzzle, and a good log management tool can
really help your business run more efficiently. Our team loves log mana
4 min
IT Ops
JSON logging in Apache and Nginx with Logentries
I’m often asked on calls with our customers what is the preferred format for log
data being sent to Logentries
[https://logentries.com/centralize-log-data-automatically/?le_trial=json_logging_in_apache_and_nginx-logentries_blog-post_cta-create_trial&utm_campaign=json_logging_in_apache_and_nginx&utm_source=logentries_blog&utm_medium=post_cta&utm_content=create_trial]
. While we pride ourselves on being the Log Management
[https://logentries.com/doc/log-management/] tool that is easiest to setup a
2 min
IT Ops
4 Ways to Use Centralized Log Management for Improved Production Monitoring
Is your team focused on preventing outages and minimizing downtime in
production?
Time to resolution is one of the most important operational KPIs for Ops teams,
becauseany time that your application is down, is too long for your users.
Whether it’s minutes, hours, or (in a worst case-scenario) days, any time that
your systems are down, your business is losing money; and more importantly,
customer trust and satisfaction. This creates additional pressure on your team
and hurts employee morale. By
2 min
IT Ops
Revisiting the Past with Logentries and Syslog
When I was younger I was always amazed by my grandfather. He would revel me
in stories about how, when growing up, not only did he not have a car or
television, but he had to walk up hill “both ways” to get to school – without
shoes! And here I am today more or less saying the same thing about the late
70’s and early 80’s when client-server changeover that occurred during that time
and we all had servers sitting in our closets. Setting up syslog
[https://logentries.com/doc/about-syslog/] back in