Welcome!

Release Management Authors: Pat Romanski, Elizabeth White, David H Deans, Liz McMillan, Jnan Dash

Related Topics: Microservices Expo, Java IoT, Linux Containers, Containers Expo Blog, @CloudExpo

Microservices Expo: Press Release

Logentries Announces Machine Learning Analytics for IT Ops Monitoring

New Cloud Service for Anomaly Detection and Inactivity Alerting Improves System Up-time and Accelerates Issue Resolution

Logentries Announces Machine Learning Analytics for IT Ops Monitoring

Logentries, the most connected log management and analytics service built for the cloud, today announced new Anomaly Detection and Inactivity Alerting to help Dev and IT Ops proactively monitor, troubleshoot and resolve production system issues in real-time. Cloud-based Logentries Anomaly Detection automatically notifies users when abnormal events occur or pattern deviations surpass defined thresholds. Additionally, Logentries users can now create real-time alerting based on the absence of expected events or a shift in system behavior patterns. Using advanced machine-learning technology, the Logentries service is enabling users to proactively detect performance and security issues, and resolve problems more quickly to improve end user experience and overall system and application performance.

As modern systems are increasingly decoupled and distributed, IT and Development Operations teams often lack an effective means to monitor, troubleshoot and resolve potential issues with their production systems. When there is a shift in system behavior, or something abnormal has occurred, it is important to be automatically notified in real-time in order to mitigate potentially serious events or system-wide outages. For example, if a server response time changes from one second to five seconds, but does not generate any standard errors, Operations teams could miss the issue because they did not receive an alert. Logentries' new Anomaly Detection and Inactivity Alerting enables users to easily create a baseline query to extract specific log-based data that they want to monitor and receive alerts on.

"Logentries is quickly expanding the value of log data for our Ops team by not only centralizing and indexing all of our log sources, but now adding an automated log-based approach to monitoring and alerting that helps us to more quickly detect performance and security issues," said Geoffrey Smalling, CTO, 500friends.

With Logentries Anomaly Detection, users can:

  • Set-up real-time alerting based on deviations from important patterns and log events.
  • Easily customize Anomaly thresholds and compare different time periods.
  • Drill into specific field level data, not just generic events.
  • Receive alerts via text message, email, SMS, PagerDuty, HipChat, and Campfire.

With Logentries Inactivity Alerting, users can:

  • Monitor standard, incoming events such as an application heart beat.
  • Receive real-time alerts based on log inactivity (i.e. receive alerts when something does not occur).
  • Monitor systems for specific server performance issues or configuration issues.
  • Monitor application availability 24/7.

"It's particularly important to not only monitor errors in your logs, but proactively recognize where there has been a shift in system behavior," said Trevor Parsons, Co-founder and Chief Scientist, Logentries. "Our Anomaly Detection and Inactivity Alerting adds a new level of sophistication to Logentries that notifies users in real-time when something significantly changes in their system, such as application usage patterns, system response times or server resource consumption."

The cloud-based Logentries service collects and pre-processes log events in real-time for on-demand analysis, alerting and visualization. With custom tagging and filtering, users can correlate security and performance issues with broader infrastructure activity including application usage, server metrics, and user behavior. To learn more about Anomaly Detection, Inactivity Alerting, or to get started today with a free, all-inclusive 30-day trial of the Logentries service, visit Logentries.com

About Logentries
Logentries is the world's most connected log management and analytics service, making business insights from machine-generated log data easily accessible to development, IT and business operations teams of all sizes. With the broadest platform support and an open API, Logentries brings the value of log-level data to any system, to any team member, and to a community of more than 25,000 worldwide users. While traditional log management and analytics solutions require advanced technical skills to use, and are costly to set-up, Logentries provides an alternative designed for managing huge amounts of data, visualizing insights that matter, and sharing that information across its global user community. To sign up for the free Logentries service, visit logentries.com.

More Stories By Trevor Parsons

Trevor Parsons is Chief Scientist and Co-founder of Logentries. Trevor has over 10 years experience in enterprise software and, in particular, has specialized in developing enterprise monitoring and performance tools for distributed systems. He is also a research fellow at the Performance Engineering Lab Research Group and was formerly a Scientist at the IBM Center for Advanced Studies. Trevor holds a PhD from University College Dublin, Ireland.

IoT & Smart Cities Stories
Blockchain is a new buzzword that promises to revolutionize the way we manage data. If the data is stored in a blockchain there is no need for a middleman - the distributed database is stored on multiple and there is no need to have a centralized server that will ensure that the transactions can be trusted. The best way to understand how a blockchain works is to build one. During this presentation, we'll start with covering the basics (hash, nounce, block, smart contracts) and then we'll crea...
History of how we got here. What IoT devices are most vulnerable? This presentation will demonstrate where hacks are most successful, through hardware, software, firmware or the radio connected to the network. The hacking of IoT devices and systems explained in 6 basic steps. On the other side, protecting devices continue to be a challenging effort. Product vendors/developers and customers are all responsible for improving IoT device security. The top 10 vulnerabilities will be presented a...
As the fourth industrial revolution continues to march forward, key questions remain related to the protection of software, cloud, AI, and automation intellectual property. Recent developments in Supreme Court and lower court case law will be reviewed to explain the intricacies of what inventions are eligible for patent protection, how copyright law may be used to protect application programming interfaces (APIs), and the extent to which trademark and trade secret law may have expanded relev...
Never mind that we might not know what the future holds for cryptocurrencies and how much values will fluctuate or even how the process of mining a coin could cost as much as the value of the coin itself - cryptocurrency mining is a hot industry and shows no signs of slowing down. However, energy consumption to mine cryptocurrency is one of the biggest issues facing this industry. Burning huge amounts of electricity isn't incidental to cryptocurrency, it's basically embedded in the core of "mini...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Every organization is facing their own Digital Transformation as they attempt to stay ahead of the competition, or worse, just keep up. Each new opportunity, whether embracing machine learning, IoT, or a cloud migration, seems to bring new development, deployment, and management models. The results are more diverse and federated computing models than any time in our history.
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
Atmosera delivers modern cloud services that maximize the advantages of cloud-based infrastructures. Offering private, hybrid, and public cloud solutions, Atmosera works closely with customers to engineer, deploy, and operate cloud architectures with advanced services that deliver strategic business outcomes. Atmosera's expertise simplifies the process of cloud transformation and our 20+ years of experience managing complex IT environments provides our customers with the confidence and trust tha...
Where many organizations get into trouble, however, is that they try to have a broad and deep knowledge in each of these areas. This is a huge blow to an organization's productivity. By automating or outsourcing some of these pieces, such as databases, infrastructure, and networks, your team can instead focus on development, testing, and deployment. Further, organizations that focus their attention on these areas can eventually move to a test-driven development structure that condenses several l...