Posts tagged Logentries

5 min IT Ops

Logs for SEO

I write blog posts on a number of different sites that are not my own, and that is an exercise in pure writing joy. I compose the posts, I submit them, and voila!  They’re published on nice-looking sites, promoted by people with reach, and read by many (hopefully) interested readers.  Life is good. By way of comparison, when it comes to my own blog, life is not quite so simple.  On my own blog, I have to write the posts and manage all of the details that are abstracted away when I write for o

6 min IT Ops

Queuing tasks with Redis

Overview As stated on their official homepage [http://redis.io/], Redis is an open source (BSD licensed), in-memory data structure store, used as database, cache and message broker. Little bit about what Redis can do. It supports data structures such as strings [http://redis.io/topics/data-types-intro#strings], hashes [http://redis.io/topics/data-types-intro#hashes], lists [http://redis.io/topics/data-types-intro#lists], sets [http://redis.io/topics/data-types-intro#sets], sorted sets [http:/

5 min IT Ops

The Power of IOT with a Query Language

Using Logentries Query Language (LEQL) to analyze Sensor Data This is one of a series of IoT blogs that show how easy it can be to integrate a range of real sensor devices with Logentries. The focus of this blog is to show how the Logentries Query Language (LEQL) can be used to search and analyze that data. A separate blog will also show the usefulness of the alerting functionality in Logentries, where labels can be set that will display with matching events/data, alerts can be sent to a range

12 min IT Ops

How to Ensure Self Describing Log Data Using Log4Net

In a previous article, The Benefit of Having an Enterprise Logging Policy [/2016/04/06/the-benefit-of-having-an-enterprise-logging-policy/], I presented the case for always using self-describing data formats when logging information. Using self-describing formats, such as key-value pairs and JSON, saves time and effort in terms of indexing and subsequently querying your logs on the backend. Also, logs that use a self-describing data format are easier to understand by anyone, at any time. In t

2 min IT Ops

15 Events to Log for Better DevOps

DevOps practices are now finding their way into more and more organizations. Up to now, as the DevOps movement has started to percolate across various industries the focus has been on improving the IT department. In InsightOps’ article15 Events to Log for Better DevOps [https://information.rapid7.com/15-events-for-better-devops.html]we discuss how the effective application of DevOps principals can benefit every department in the organization. Below are some excerpts from the full article, avai

8 min IT Ops

Using JavaScript to interact with the REST Query API

We’re very excited to announce that our REST Query API is now available [/2016/05/now-available-rest-query-api/]. With this API, you can: * make it easy to remotely query your log data * easily integrate Logentries with third party solutions, external systems and internal tools * allow users and systems to query their log data programmatically over our REST API In this article, I will show how you can quickly interact with the Query API by sending in a LEQL query [https://logentries

3 min IT Ops

How to: Send SMS messages to Logentries in under 5 minutes (maybe 10)

The “Internet Of Things” continues to be talked about a lot with an increasing number of devices now containing some sort of smart functionality which can be interacted with. Here’s a great article about end-to-end IoT monitoring [/2014/12/end-to-end-iot-monitoring-with-log-data/] by colleague David Tracey. However, not all IoT devices can be in locations with WiFi or 3/4G coverage, so they can not easily (or at all) send or receive data over the internet, and instead rely on standard cellula

4 min IT Ops

How to Log from Azure Virtual Machines

You have evaluated the many IaaS providers [http://info.logentries.com/how-to-compare-google-compute-engine-and-aws-ec2?le_tofu=LogFromAzure-leblog] out there and you have decided on Azure Compute [https://azure.microsoft.com/en-us/documentation/scenarios/virtual-machines/].  Great choice! Azure is an ideal provider with broad support for various operating systems, programming languages, frameworks, tools, databases and devices. Azure also has the unique ability to facilitate hybrid deploymen

15 min IT Ops

How to Compare Google Compute Engine & AWS EC2

Which Virtual Machine is Best: Google’s Compute Engine or Amazon’s EC2? It Depends. The Internet might seem like a Wild West of chaotic connections because it often is. Companies like Google and Amazon have been managing to create order out of the chaos for years by understanding the nature of the World Wide Web. Within the last 10 years, Google and Amazon have leveraged that understanding into a robust suite of product offerings in the field of Infrastructure-as-a- Service, or IaaS. The corn

3 min Metasploit

Securing Your Metasploit Logs

Metasploit, backed by a community of 200,000 users and contributors is the most impactful penetration testing solution on the planet. With it, uncover weaknesses in your defenses, focus on the highest risks, and improve your security outcomes. Your Metasploit Pro console produces a lot of important logs. It is essential to be able to review these logs, alert on them, and keep them secure. Why should I monitor these logs? The logs produced by your Metasploit Pro console are helpful when troubl

7 min IT Ops

The Benefit of Having an Enterprise Logging Policy

Lack of an enterprise logging policy is a common shortcoming when it comes to the organizational discipline of logging from within large, distributed applications. Just because you can get log data into a system, it does not necessarily follow that the data you are entering is useful. The old adage, garbage in, garbage out holds true. If an enterprise allows anybody to enter log data in any way possible, anybody will. In the long run, without a proper policy for logging, and procedures to supp

1 min IT Ops

Infographic: What scares IT Professionals most about IT Infrastructure

Download Now [http://info.logentries.com/logentries-download-infographic-it-infrastructure] Logentries surveyed IT Professionals identifying themselves as members of Information Technology Teams, Operations Teams, and Development Teams Asking them: “What scares you the most about your IT infrastructure?” The answers highlighted Security concerns, System Failure, Operational costs, and the complexities of SDN (Software Defined Networking). We saw many responses reinforcing the need to conti

6 min IT Ops

Do You Still Email Yourself from Your Code? How to Stop the Madness

A few years back now, I took on an assignment to help a company modernize a series of legacy .NET applications.  One of these did some back office processing.  A vendor would stick some files on a shared drive, and a windows scheduled task would invoke this bit of code to parse the file, apply a whole slew of business rules to its contents, and then update the appropriate internal systems.  The details are both proprietary and uninteresting, so I will spare you those. The author of this appli

13 min IT Ops

The 4 Steps for Creating a Log Enabled Marketing Campaign

Typically, most logging activity in the online world is concerned with collecting information about an enterprise’s digital infrastructure. Machine logs, application logs, network logs, database logs, access logs are a few examples of such activity. However, as marketing campaigns become more integrated into application activity, using log data to monitor and to measure the effectiveness of a campaign is a viable extension of an enterprise’s current logging activity. But, we need to beware.

5 min IT Ops

Brics Vs RE2/J

By Benoit Gaudin and Mark Lacomber Regular Expressions When it comes to searching unstructured data, regular expressions [https://logentries.com/doc/regex/] are a very useful and powerful tool. The power provided by popular regular expression libraries does come with a significant performance cost in some cases though, both when compiling regular expressions into automata (state explosion problem when determinising automata, as illustrated on some examples here [http://www.microarch.org/micro4