贴有Logentries标签的帖子

4 min IT Ops

REST API:一点cURL和一些Python

Here at Logentries [http://logentries.com/centralize-log-data-automatically/?le_trial=rest_api_curl_and_python-logentries_blog-post_cta-create_trial&utm_campaign = rest_api_curl_and_python&utm_source = logentries_blog&utm_medium=post_cta&utm_content = create_trial] work has been going for sometime in bringing to our customers a powerful and flexible REST API [/2014/09/the-abcs-of-rest/] service for interaction with their log data. 这项工作从REST查询API开始 [/2016/05/now-availab

3 min IT Ops

备份日志检查和它们能告诉你什么

There is simply no substitute for a recent, accurate backup when it comes to 从文件或系统损坏或中断中恢复. 但备份必须是 完整和无错误,使完全恢复成为可能. That’s why inspecting log files from backups is a critical and important step in verifying their accuracy or coverage, and a necessary check before performing a restore that 将任何备份映像或文件转换为生产状态. Your backup logs [http://logentries.com/centralize-log

5 min IT Ops

在记录日志时保持代码整洁

In my consultancy practice, one of the things that I do most frequently is help 团队编写所谓的“干净代码”.“通常,这是围绕测试驱动的 development (TDD) and writing code that is easily maintained via regression 测试和无风险重构.  团队想要了解如何做到这一点,并且 how to do it in their production code (as opposed to in some kind of toy “let’s 制作计算器(练习). One of the most prominent, early sticking points that rears its head tend

6 min IT Ops

Rsyslog使用Netscaler将TCP/IP日志转发到Logentries

这篇客座文章最初出现在IBM developerWorks上 [http://developer.ibm.com/recipes/tutorials/rsyslog-tcpip-log-forwarding-to-logentries-with-netscaler/] . Overview The aim of the article is to cover technical areas on how to load balance Rsyslog TCP/IP traffic from Redhat Server to Logentries (a third party solutions for real time log management, monitoring and analytics) and configuration used for load balancing network traffic flow between the connected servers. Majority of virtu

3 min IT Ops

Introducing LEQL: LIMIT

The Logentries query language, also known as LEQL, offers a very expressive way to query log data. 如果您不熟悉LEQL,您可以得到一个很好的概述 from one of our previous blog posts here [/2015/06/introducing-leql/]. Today we’re excited to announce the latest extension of LEQL’s capabilities – Limit. If you want to skip reading about this and just go try it out for yourself then 转到LEQL Querybuilder中的高级视图 [http://docs.logentries.com/docs/search # section-leq

5 min IT Ops

Leexportpy简介

What is Leexportpy? Leexportpy [http://github.Com/logentries/leexportpy]是一个灵活的和 extensible Python application that enables log search results to be easily exported to third party services such as Geckoboard and HostedGraphite. The 应用程序利用Logentries REST API [/2016/05/now-available-rest-query-api/] providing you with the ability to easily create queries on any of your log data, transform the results to the data 第三方服务和推送传输所需的格式

9 min IT Ops

使用Log4J的自描述日志

UPDATE POSTED 12.12.21:如果您正在使用Log4j,请注意在12月 2021年10月10日,Apache发布 [http://logging.apache.org/log4j/2.x/security.html#Fixed_in_Log4j_2.15.0] version 2.15.0 of their Log4j framework, which included a fix for CVE-2021-44228 [http://attackerkb./ topics/in9spr2bzt/cve -2021-44228],一个关键的(CVSSv3) 10) remote code execution (RCE) vulnerability affecting Apache Log4j 2.14.1 and earlier versions. 这是一个严重的漏洞,我们强烈建议您这样做

4 min IT Ops

审计日志如何帮助确认和纠正安全策略

There are many possible definitions for the term “security policy,” but all of 它们有一些共同的元素. 安全策略应该列出什么 assets, both physical and digital, an organization wishes to protect. It should 解释什么是安全,什么是行为安全. In short, a security policy identifies what assets are to be protected, what kinds of risks such protection is meant to defeat or mitigate, and how security can be established, measured, and monitored. A

6 min IT Ops

信号和噪声是最好的世界记录

One of the absolute, classic pieces of advice that you’ll hear when it comes to logging is what I think of as the iconic Goldilocks logging advice.  It goes something like this. When it comes to logging, you don’t want to miss anything important because 日志记录帮助您理解应用程序的行为.  But youalsodon’t want to log too much.  如果日志记录太多,日志将变得无用.  You want to log just the right amount. 当然,这是明智的建议.  Right? 或者,当你停下来的时候

20 min IT Ops

SSH from the ground up

If you work professionally in the IT industry, chances are you’ve been using OpenSSH为您的日常工作提供了很长一段时间. OpenSSH however provides so much more than “just” remote shell on *nix system (显然在Windows上也是如此[http://github].com/PowerShell/Win32-OpenSSH)太 now!) and in this article we’re going to explore some of the non immediate uses of ssh and introduce a few 辅助工具使SSH的使用变得更好. 示例的约定 我们需要设置一些项

4 min IT Ops

将一个web应用迁移到Angular

At some point many applications get to a state in which a large refactoring or 在某些情况下,需要进行完全的重写. 这样做的决定可以是 driven by many factors. 例如,代码库正在快速增长 current architecture cannot support the growth, components are becoming too tightly coupled and need to be split, new and better technology becomes available which offers significant improvements or due to other factors the 当前的代码库没有得到维护

3 min IT Ops

网络研讨会回顾:Tableau服务器日志分析

Our webinar [http://info.logentries.com/tableau - pluralsight logentries研讨会- 2016] broadcasted & 记录于2016年6月16日. 在此期间播放Tableau Zen Master Mike Roberts of Pluralsight discussed how to develop a simple technology 堆栈用于使用logentry的下一代Tableau管理 [http://logentries.com/centralize-log-data-automatically/?le_trial=tableau_webinar_june16_recap-logentries_blog-post_cta-create_trial&utm_campaign = tableau_webinar_june16_recap&utm_source=logentr

11 min IT Ops

Monitoring SNS Activity Using a Lambda Function and Logentries

Amazon Web Services Lambda函数非常酷. A Lambda function is a feature in Amazon Web Services that allows you to put a discrete piece of computing logic up in The Cloud and then access that logic to meet a particular need. For example, you can create a Lambda function that takes a list of stock symbols and does some analysis on the list using other cloud based services in 为了建议最好的股票购买. Logentries发挥了Lambda函数的强大功能 [http://docs.logentrie

3 min IT Ops

Checking Active Directory (AD) Security and Integrity via Log Monitoring

Because AD literally holds the keys to the kingdom for domain-based networks and runtime environments, it’s usually a good idea to keep a close eye on those keys, how they’re being used and what kinds of attacks might be directed at them. Monitoring AD related event logs provides one great tool in exercising due 安全诚信勤奋. 对特定的高影响事件进行警报 provides yet another. For over two decades now, Microsoft’s Active Directory (AD) has provided a powerful set

3 min IT Ops

Exploiting Zookeeper for managing processes in a production environment with Lockex

Lock and execute! 作为logentry的工程师 [http://logentries.com/centralize-log-data-automatically/?le_trial=exploiting_zookeeper-logentries_blog-post_cta-create_trial&utm_campaign = exploiting_zookeeper&utm_source = logentries_blog&utm_medium=post_cta&utm_content = create_trial] I need to maintain a complex system that has requirements for being available to our customers. 我们总是构建具有抵抗能力的系统 failure. 在我们的环境中,我们有过程和dae