4 min
IT Ops
A Query Language for Your Logs
Application logging is the software world’s version of archeology. At runtime,
your application lives in a rich, colorful, 3-dimensional world of flowing
aqueducts, packed coliseums, and bustling streets. There’s more going on than
can possibly be captured.
When you’re trying to reproduce and correct a reported issue, you play
archeologist. The vibrant, live world is gone, and you’re left to piece reality
back together using only decorated pots, spearheads, and fragments of frescoes.
In oth
6 min
IT Ops
Integrating the Logentries Javascript Library With React
React.js has proven itself a powerful contender in the world of Javascript
frameworks. Arguably, it has become one of a handful of libraries that all web
developers should consider for current or upcoming projects. Understanding how
it integrates with other libraries in your technology stack is an important part
of that consideration. If you currently use, or are considering using Logentries
[https://logentries.com/centralize-log-data-automatically/?le_trial=react-logentries_blog-post_cta-crea
5 min
IT Ops
Logs for SEO
I write blog posts on a number of different sites that are not my own, and that
is an exercise in pure writing joy. I compose the posts, I submit them, and
voila! They’re published on nice-looking sites, promoted by people with reach,
and read by many (hopefully) interested readers. Life is good.
By way of comparison, when it comes to my own blog, life is not quite so simple.
On my own blog, I have to write the posts and manage all of the details that
are abstracted away when I write for o
6 min
IT Ops
Queuing tasks with Redis
Overview
As stated on their official homepage [http://redis.io/], Redis is an open source
(BSD licensed), in-memory data structure store, used as database, cache and
message broker.
Little bit about what Redis can do. It supports data structures such as strings
[http://redis.io/topics/data-types-intro#strings], hashes
[http://redis.io/topics/data-types-intro#hashes], lists
[http://redis.io/topics/data-types-intro#lists], sets
[http://redis.io/topics/data-types-intro#sets], sorted sets
[http:/
5 min
IT Ops
The Power of IOT with a Query Language
Using Logentries Query Language (LEQL) to analyze Sensor Data
This is one of a series of IoT blogs that show how easy it can be to integrate a
range of real sensor devices with Logentries. The focus of this blog is to show
how the Logentries Query Language (LEQL) can be used to search and analyze that
data. A separate blog will also show the usefulness of the alerting
functionality in Logentries, where labels can be set that will display with
matching events/data, alerts can be sent to a range
12 min
IT Ops
How to Ensure Self Describing Log Data Using Log4Net
In a previous article, The Benefit of Having an Enterprise Logging Policy
[/2016/04/06/the-benefit-of-having-an-enterprise-logging-policy/], I presented
the case for always using self-describing data formats when logging information.
Using self-describing formats, such as key-value pairs and JSON, saves time and
effort in terms of indexing and subsequently querying your logs on the backend.
Also, logs that use a self-describing data format are easier to understand by
anyone, at any time.
In t
2 min
IT Ops
15 Events to Log for Better DevOps
DevOps practices are now finding their way into more and more organizations. Up
to now, as the DevOps movement has started to percolate across various
industries the focus has been on improving the IT department. In InsightOps’
article15 Events to Log for Better DevOps
[https://information.rapid7.com/15-events-for-better-devops.html]we discuss how
the effective application of DevOps principals can benefit every department in
the organization.
Below are some excerpts from the full article, avai
8 min
IT Ops
Using JavaScript to interact with the REST Query API
We’re very excited to announce that our REST Query API is now available
[/2016/05/now-available-rest-query-api/]. With this API, you can:
* make it easy to remotely query your log data
* easily integrate Logentries with third party solutions, external systems and
internal tools
* allow users and systems to query their log data programmatically over our
REST API
In this article, I will show how you can quickly interact with the Query API by
sending in a LEQL query [https://logentries
3 min
IT Ops
How to: Send SMS messages to Logentries in under 5 minutes (maybe 10)
The “Internet Of Things” continues to be talked about a lot with an increasing
number of devices now containing some sort of smart functionality which can be
interacted with. Here’s a great article about end-to-end IoT monitoring
[/2014/12/end-to-end-iot-monitoring-with-log-data/] by colleague David Tracey.
However, not all IoT devices can be in locations with WiFi or 3/4G coverage, so
they can not easily (or at all) send or receive data over the internet, and
instead rely on standard cellula
4 min
IT Ops
How to Log from Azure Virtual Machines
You have evaluated the many IaaS providers
[http://info.logentries.com/how-to-compare-google-compute-engine-and-aws-ec2?le_tofu=LogFromAzure-leblog]
out there and you have decided on Azure Compute
[https://azure.microsoft.com/en-us/documentation/scenarios/virtual-machines/].
Great choice! Azure is an ideal provider with broad support for various
operating systems, programming languages, frameworks, tools, databases and
devices. Azure also has the unique ability to facilitate hybrid deploymen
15 min
IT Ops
How to Compare Google Compute Engine & AWS EC2
Which Virtual Machine is Best: Google’s Compute Engine or Amazon’s EC2? It
Depends.
The Internet might seem like a Wild West of chaotic connections because it often
is. Companies like Google and Amazon have
been managing to create order out of the chaos for years by understanding the
nature of the World Wide Web. Within the last 10 years, Google and Amazon have
leveraged that understanding into a robust suite of product offerings in the
field of Infrastructure-as-a- Service, or IaaS.
The corn
3 min
Metasploit
Securing Your Metasploit Logs
Metasploit, backed by a community of 200,000 users and contributors is the most
impactful penetration testing solution on the planet. With it, uncover
weaknesses in your defenses, focus on the highest risks, and improve your
security outcomes. Your Metasploit Pro console produces a lot of important logs.
It is essential to be able to review these logs, alert on them, and keep them
secure.
Why should I monitor these logs?
The logs produced by your Metasploit Pro console are helpful when
troubl
7 min
IT Ops
The Benefit of Having an Enterprise Logging Policy
Lack of an enterprise logging policy is a common shortcoming when it comes to
the organizational discipline of logging from within large, distributed
applications. Just because you can get log data into a system, it does not
necessarily follow that the data you are entering is useful. The old adage,
garbage in, garbage out holds true. If an enterprise allows anybody to enter log
data in any way possible, anybody will. In the long run, without a proper policy
for logging, and procedures to supp
5 min
IT Ops
Client Side Logging In Javascript
Developers are writing Javascript applications of increasing complexity designed
to run in web browsers, on desktops, and on servers. Javascript applications
have reached a level of maturity that means they are running important business
operations. They must be more maintainable and supportable now that they have
achieved this level of responsibility in the enterprise. Javascript
applications should be expected to provide the same information for support and
maintenance as any other applic
1 min
IT Ops
Infographic: What scares IT Professionals most about IT Infrastructure
Download Now
[http://info.logentries.com/logentries-download-infographic-it-infrastructure]
Logentries surveyed IT Professionals identifying themselves as members of
Information Technology Teams, Operations Teams, and Development Teams Asking
them:
“What scares you the most about your IT infrastructure?”
The answers highlighted Security concerns, System Failure, Operational costs,
and the complexities of SDN (Software Defined Networking).
We saw many responses reinforcing the need to conti