4 min
IT Ops
REST API: a little cURL and some Python
Here at Logentries
[https://logentries.com/centralize-log-data-automatically/?le_trial=rest_api_curl_and_python-logentries_blog-post_cta-create_trial&utm_campaign=rest_api_curl_and_python&utm_source=logentries_blog&utm_medium=post_cta&utm_content=create_trial]
work has been going for sometime in bringing to our customers a powerful and
flexible REST API [/2014/09/the-abcs-of-rest/] service for interaction with
their log data. This work started out with the REST Query API
[/2016/05/now-availab
3 min
IT Ops
Backup Log Checks and What They Can Tell You
There is simply no substitute for a recent, accurate backup when it comes to
recovering from file or system damage or outages. But that backup must be
complete and error-free to make a full recovery possible. That’s why inspecting
log files from backups is a critical and important step in verifying their
accuracy or coverage, and a necessary check before performing a restore that
converts any backup image or files into production status.
Your backup logs
[https://logentries.com/centralize-log
5 min
IT Ops
Keep Your Code Clean while Logging
In my consultancy practice, one of the things that I do most frequently is help
teams write so-called “clean code.” Usually, this orients around test-driven
development (TDD) and writing code that is easily maintained via regression
tests and risk-free refactoring. Teams want to understand how to do this, and
how to do it in their production code (as opposed to in some kind of toy “let’s
build a calculator” exercise).
One of the most prominent, early sticking points that rears its head tend
6 min
IT Ops
Rsyslog TCP/IP log forwarding to Logentries with Netscaler
This guest post originally appeared on IBM developerWorks
[https://developer.ibm.com/recipes/tutorials/rsyslog-tcpip-log-forwarding-to-logentries-with-netscaler/]
.
Overview
The aim of the article is to cover technical areas on how to load balance
Rsyslog TCP/IP traffic from Redhat Server to Logentries (a third party solutions
for real time log management, monitoring and analytics) and configuration used
for load balancing network traffic flow between the connected servers.
Majority of virtu
3 min
IT Ops
Introducing LEQL: LIMIT
The Logentries query language, also known as LEQL, offers a very expressive way
to query log data. If you’re unfamiliar with LEQL you can get a nice overview
from one of our previous blog posts here [/2015/06/introducing-leql/]. Today
we’re excited to announce the latest extension of LEQL’s capabilities – Limit.
If you want to skip reading about this and just go try it out for yourself then
head over to theadvanced view in LEQL Querybuilder
[https://docs.logentries.com/docs/search#section-leq
5 min
IT Ops
Introduction to Leexportpy
What is Leexportpy?
Leexportpy [https://github.com/logentries/leexportpy] is a flexible and
extensible Python application that enables log search results to be easily
exported to third party services such as Geckoboard and HostedGraphite. The
application utilizes the Logentries REST API
[/2016/05/now-available-rest-query-api/] providing you with the ability to
easily create queries on any of your log data, transform the results to the data
format needed by the third party service and push tran
9 min
IT Ops
Self-describing Logging Using Log4J
UPDATE POSTED 12.12.21: If you are using Log4j, please be aware that on December
10, 2021, Apache released
[https://logging.apache.org/log4j/2.x/security.html#Fixed_in_Log4j_2.15.0]
version 2.15.0 of their Log4j framework, which included a fix for CVE-2021-44228
[https://attackerkb.com/topics/in9sPR2Bzt/cve-2021-44228], a critical (CVSSv3
10) remote code execution (RCE) vulnerability affecting Apache Log4j 2.14.1 and
earlier versions. This is a critical vulnerability, and we strongly urge you t
4 min
IT Ops
How Audit Logs Help Confirm and Correct Security Policy
There are many possible definitions for the term “security policy,” but all of
them share certain elements in common. A security policy should lay out what
assets, both physical and digital, an organization wishes to protect. It should
explain what it means to be secure and to behave securely. In short, a security
policy identifies what assets are to be protected, what kinds of risks such
protection is meant to defeat or mitigate, and how security can be established,
measured, and monitored. A
6 min
IT Ops
Signal AND Noise The Best of All Worlds for Logging
One of the absolute, classic pieces of advice that you’ll hear when it comes to
logging is what I think of as the iconic Goldilocks logging advice. It goes
something like this.
When it comes to logging, you don’t want to miss anything important because
logging helps you understand your application’s behavior. But youalsodon’t want
to log too much. If you log too much, the log becomes useless. You want to log
just the right amount.
Sage advice, to be sure. Right?
Or, maybe, when you sto
20 min
IT Ops
SSH from the ground up
If you work professionally in the IT industry, chances are you’ve been using
OpenSSH for a long time now for your day to day work.
OpenSSH however provides so much more than “just” remote shell on *nix system
(and apparently on Windows [https://github.com/PowerShell/Win32-OpenSSH] too
now!) and in this article
we’re going to explore some of the non immediate uses of ssh and introduce a few
accessory tools that make using ssh even better.
Conventions for the examples
We need to set some termi
4 min
IT Ops
Migrating a web app to Angular
At some point many applications get to a state in which a large refactoring or
in some cases a complete rewrite needs to happen. The decision to do so can be
driven by many factors. For example, the code base is growing rapidly and the
current architecture cannot support the growth, components are becoming too
tightly coupled and need to be split, new and better technology becomes
available which offers significant improvements or due to other factors the
current code base is just not maintain
3 min
IT Ops
Webinar Recap: Tableau Server Log Analytics
Our webinar
[http://info.logentries.com/tableau-pluralsight-logentries-webinar-2016] was
broadcasted & recorded on June 16th 2016. During this broadcast Tableau Zen
Master Mike Roberts of Pluralsight discussed how to develop a simple technology
stack for next-gen management of Tableau using Logentries
[https://logentries.com/centralize-log-data-automatically/?le_trial=tableau_webinar_june16_recap-logentries_blog-post_cta-create_trial&utm_campaign=tableau_webinar_june16_recap&utm_source=logentr
11 min
IT Ops
Monitoring SNS Activity Using a Lambda Function and Logentries
Amazon Web Services Lambda functions are very cool. A Lambda function is a
feature in Amazon Web Services that allows you to put a discrete piece of
computing logic up in The Cloud and then access that logic to meet a particular
need. For example, you can create a Lambda function that takes a list of stock
symbols and does some analysis on the list using other cloud based services in
order to suggest the best stock to buy.
Logentries has put the power of Lambda functions
[https://docs.logentrie
3 min
IT Ops
Checking Active Directory (AD) Security and Integrity via Log Monitoring
Because AD literally holds the keys to the kingdom for domain-based networks and
runtime environments, it’s usually a good idea to keep a close eye on those
keys, how they’re being used and what kinds of attacks might be directed at
them. Monitoring AD related event logs provides one great tool in exercising due
security and integrity diligence. Alerting on specific high-impact events
provides yet another.
For over two decades now, Microsoft’s Active Directory (AD) has provided a
powerful set
3 min
IT Ops
Exploiting Zookeeper for managing processes in a production environment with Lockex
Lock and execute!
As an engineer here at Logentries
[https://logentries.com/centralize-log-data-automatically/?le_trial=exploiting_zookeeper-logentries_blog-post_cta-create_trial&utm_campaign=exploiting_zookeeper&utm_source=logentries_blog&utm_medium=post_cta&utm_content=create_trial]
I need to maintain a complex system that has requirements for being available to
our customers. We always build systems with the ability to be resistant to
failure.
In our environment, we have processes and dae