In the Log Management World: Are you a Fox or Hedgehog?
I’ve recently been reading Nate Silver’s book, “The Signal and the
Noise.” In the book, Silver looks at a number of areas where predictions
have been made and considers how successful they have been, as well as the
reasons why they have been accurate (or not).
in the log management world are you a fox or hedgehod
Register For DevOps Summit "FREE" (before Friday) ▸ Here
I couldn’t help but draw the similarities how most companies use log
management tools today.
Silver’s particular interests are political forecasting (see
www.fivethirtyeight.com) and baseball, particularly predicting player
performance. He doesn’t always get his predictions right, but he does
explain the rationale behind his predictions and seeks to be unbiased.
In his book, he also considers other areas such as meteorology where the
models are based o... (more)
As one of the founders of Logentries, I have had the chance to meet 1000’s
of our user sover the past few years . Sometimes at tech talks, meet ups,
trade shows or wherever our paths have crossed :).
One consistent murmur we hear is ‘graphite, graphite, graphite…’
For anyone who doesn’t know, Graphite is a widely used, near real time
Although typically used to capture information like CPU or memory usage,
Graphite is completely agnostic about the nature of the data being stored
inside it. In fact, a very common use case for Graphite is to consume
Boston, Massachusetts (September 23, 2014) – Logentries, the log management
and analytics service built for the cloud, today announced a New Relic
integration that provides real-time visibility into log level transactions
from client-side devices (such as mobile apps or web browsers) to traditional
application and backend servers. The new integration enables users to quickly
drill down from an application performance metrics view within the New Relic
app into Logentries to see and analyze the matching log events that were
generated as part of a specific transaction. Users can now... (more)
How to Trace Transactions Across Every Layer of Your Distributed Software
On every invocation of a method along the transaction data is logged. An
example of what might be logged by an APM tool is as follows:
unique transaction id - sequence number - call depth - method details -
You can then easily piece together full transaction traces by ordering all
method calls by sequence number. Further analysis can be applied to this
information for a number of purposes. For example, by analysing the
transactions, developers can easily construct design diagrams that c... (more)
Three Common Problems Solved With JSON
One of the most common questions we get asked by customers is:
“What’s the best way to log my data?” My answer is always:
"log using JSON format wherever possible.”
The next question we often get asked – (but not as much)…
Yeah JSON, …Hmmm, what is JSON again?
But put simply, this is a way that data can be stored in a structured format,
where each piece of data will usually have an identifier (known as a key) and
a value (which can be in multiple formats). It also can have a nested