5 min
IT Ops
Raspberry Pi, Logs and IoT - Sending Pi Log and Sensor data to Logentries
In the previous blog post
[/2016/02/iot-made-real-using-ti-sensortag-data-with-logentries/] we learned how
to send IoT data from the TI CC 2650 SensorTag to Logentries using Node-Red and
directly using Linux. This Blog will show how to send data from a Raspberry Pi
device to Logentries
[https://logentries.com/centralize-log-data-automatically/?le_trial=raspberry_pi-logentries_blog-post_cta-create_trial&utm_campaign=raspberry_pi&utm_source=logentries_blog&utm_medium=post_cta&utm_content=create_
4 min
IT Ops
A Query Language for Your Logs
Application logging is the software world’s version of archeology. At runtime,
your application lives in a rich, colorful, 3-dimensional world of flowing
aqueducts, packed coliseums, and bustling streets. There’s more going on than
can possibly be captured.
When you’re trying to reproduce and correct a reported issue, you play
archeologist. The vibrant, live world is gone, and you’re left to piece reality
back together using only decorated pots, spearheads, and fragments of frescoes.
In oth
6 min
IT Ops
Integrating the Logentries Javascript Library With React
React.js has proven itself a powerful contender in the world of Javascript
frameworks. Arguably, it has become one of a handful of libraries that all web
developers should consider for current or upcoming projects. Understanding how
it integrates with other libraries in your technology stack is an important part
of that consideration. If you currently use, or are considering using Logentries
[https://logentries.com/centralize-log-data-automatically/?le_trial=react-logentries_blog-post_cta-crea
6 min
IT Ops
Queuing tasks with Redis
Overview
As stated on their official homepage [http://redis.io/], Redis is an open source
(BSD licensed), in-memory data structure store, used as database, cache and
message broker.
Little bit about what Redis can do. It supports data structures such as strings
[http://redis.io/topics/data-types-intro#strings], hashes
[http://redis.io/topics/data-types-intro#hashes], lists
[http://redis.io/topics/data-types-intro#lists], sets
[http://redis.io/topics/data-types-intro#sets], sorted sets
[http:/
12 min
IT Ops
How to Ensure Self Describing Log Data Using Log4Net
In a previous article, The Benefit of Having an Enterprise Logging Policy
[/2016/04/06/the-benefit-of-having-an-enterprise-logging-policy/], I presented
the case for always using self-describing data formats when logging information.
Using self-describing formats, such as key-value pairs and JSON, saves time and
effort in terms of indexing and subsequently querying your logs on the backend.
Also, logs that use a self-describing data format are easier to understand by
anyone, at any time.
In t
8 min
IT Ops
Using JavaScript to interact with the REST Query API
We’re very excited to announce that our REST Query API is now available
[/2016/05/now-available-rest-query-api/]. With this API, you can:
* make it easy to remotely query your log data
* easily integrate Logentries with third party solutions, external systems and
internal tools
* allow users and systems to query their log data programmatically over our
REST API
In this article, I will show how you can quickly interact with the Query API by
sending in a LEQL query [https://logentries
3 min
IT Ops
How to: Send SMS messages to Logentries in under 5 minutes (maybe 10)
The “Internet Of Things” continues to be talked about a lot with an increasing
number of devices now containing some sort of smart functionality which can be
interacted with. Here’s a great article about end-to-end IoT monitoring
[/2014/12/end-to-end-iot-monitoring-with-log-data/] by colleague David Tracey.
However, not all IoT devices can be in locations with WiFi or 3/4G coverage, so
they can not easily (or at all) send or receive data over the internet, and
instead rely on standard cellula
4 min
IT Ops
How to Log from Azure Virtual Machines
You have evaluated the many IaaS providers
[http://info.logentries.com/how-to-compare-google-compute-engine-and-aws-ec2?le_tofu=LogFromAzure-leblog]
out there and you have decided on Azure Compute
[https://azure.microsoft.com/en-us/documentation/scenarios/virtual-machines/].
Great choice! Azure is an ideal provider with broad support for various
operating systems, programming languages, frameworks, tools, databases and
devices. Azure also has the unique ability to facilitate hybrid deploymen
15 min
IT Ops
How to Compare Google Compute Engine & AWS EC2
Which Virtual Machine is Best: Google’s Compute Engine or Amazon’s EC2? It
Depends.
The Internet might seem like a Wild West of chaotic connections because it often
is. Companies like Google and Amazon have
been managing to create order out of the chaos for years by understanding the
nature of the World Wide Web. Within the last 10 years, Google and Amazon have
leveraged that understanding into a robust suite of product offerings in the
field of Infrastructure-as-a- Service, or IaaS.
The corn
1 min
IT Ops
Infographic: What scares IT Professionals most about IT Infrastructure
Download Now
[http://info.logentries.com/logentries-download-infographic-it-infrastructure]
Logentries surveyed IT Professionals identifying themselves as members of
Information Technology Teams, Operations Teams, and Development Teams Asking
them:
“What scares you the most about your IT infrastructure?”
The answers highlighted Security concerns, System Failure, Operational costs,
and the complexities of SDN (Software Defined Networking).
We saw many responses reinforcing the need to conti
6 min
IT Ops
Do You Still Email Yourself from Your Code? How to Stop the Madness
A few years back now, I took on an assignment to help a company modernize a
series of legacy .NET applications. One of these did some back office
processing. A vendor would stick some files on a shared drive, and a windows
scheduled task would invoke this bit of code to parse the file, apply a whole
slew of business rules to its contents, and then update the appropriate internal
systems. The details are both proprietary and uninteresting, so I will spare
you those.
The author of this appli
13 min
IT Ops
The 4 Steps for Creating a Log Enabled Marketing Campaign
Typically, most logging activity in the online world is concerned with
collecting information about an enterprise’s digital infrastructure. Machine
logs, application logs, network logs, database logs, access logs are a few
examples of such activity. However, as marketing campaigns become more
integrated into application activity, using log data to monitor and to measure
the effectiveness of a campaign is a viable extension of an enterprise’s current
logging activity.
But, we need to beware.
5 min
IT Ops
Brics Vs RE2/J
By Benoit Gaudin and Mark Lacomber
Regular Expressions
When it comes to searching unstructured data, regular expressions are a very
useful and powerful tool. The power provided by popular regular expression
libraries does come with a significant performance cost in some cases though,
both when compiling regular expressions into automata (state explosion problem
when determinising automata) and when using these automata to match input. These
constraints are usually acceptable for individuals ne
5 min
IT Ops
A point of @Contention- cache coherence on the JVM
Java 8’s major changes- lexical closures, the stream API, e.t.c have
overshadowed a slew of little gems, one of which I only discovered the other
day- the @Contended annotation.
False Sharing
Chances are you’re reading this on a device with more than one CPU. There’s
therefore also quite a good chance the you have more than one thread of
execution running at the exact same time. There’s an equally good chance that
some of your fancy multiprocessor CPU’s on-die memory (aka L2/3 cache) is share
4 min
IT Ops
Deciphering MySQL Logs: The What, Why, and How
Logs are one of the best ways to understand what a server is doing. Thankfully,
MySQL has no shortage of log activity to assist a DBA in its maintenance. It
writes out its activity to 5 different logs. This post will take a look at the
existing MySQL logs and how they assist the administrator.
* On Windows, - The log is written to the data directory with a .err extension
even if not explicitly enabled.
* Errors are automatically written to the Event Log. This behavior is standard
and