Log Analysis - Infoworld http://www.infoworld.com/t/21624 en What's new in Logstash and why you should care http://www.infoworld.com/d/application-development/whats-new-in-logstash-and-why-you-should-care-239143?source=rss_log_analysis <div id="blog-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 192px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/data_world.jpg" alt="What's new in Logstash and why you should care" width="243" height="182" align="right" /><br /><em><p align="right">Credit: iStockphoto</p></em></div> Application Development Application Development Log Analysis Data Center Data Management Thu, 27 Mar 2014 10:00:00 +0000 Andrew Oliver 239143 at http://www.infoworld.com Splunk feels the heat from stronger, cheaper open source rivals http://www.infoworld.com/t/log-analysis/splunk-feels-the-heat-stronger-cheaper-open-source-rivals-237041?source=rss_log_analysis <div id="tw-edit" style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/BigData440x330.jpg" alt="Splunk feels the heat from stronger, cheaper open source rivals" width="243" height="182" align="right" /></div> <p>Ask most any sys admin what the No. 1, go-to product is for log analysis in the server world, and odds are you'll get the same answer from just about every corner: Splunk.</p> Big Data Data Center Log Analysis Business Intelligence Tue, 25 Feb 2014 11:00:00 +0000 InfoWorld Tech Watch 237041 at http://www.infoworld.com Big data analytics star in VMware vCenter Log Insight 1.5 update http://www.infoworld.com/d/virtualization/big-data-analytics-star-in-vmware-vcenter-log-insight-15-update-234023?source=rss_log_analysis <p>Over the last 10 years, <a href="http://www.infoworld.com/d/virtualization/top-10-benefits-server-virtualization-177828">server virtualization</a> has solidified itself as a key component to shrinking the hardware footprint of the modern data center. However, what hasn't decreased during this process of consolidation is the amount of data created on a daily basis from the devices, the physical servers, the virtual machines, and the operating systems and applications that live on each of these instances. In most of these cases, the data has become magnified.</p> Virtualization EMC VMware Big Data Server Virtualization Data Visualization Log Analysis Private Cloud Cloud Computing Virtualization Mon, 13 Jan 2014 12:30:00 +0000 David Marshall 234023 at http://www.infoworld.com Lessons from NASA: How to solve problems quickly under pressure http://www.infoworld.com/d/data-explosion/lessons-nasa-how-solve-problems-quickly-under-pressure-225209?source=rss_log_analysis <p>In my column last week, I explained the great <a href="http://www.infoworld.com/d/data-explosion/whats-worse-system-failure-what-you-say-about-it-224751">importance of communicating quickly and clearly to business stakeholders</a> both during and after an outage. That can be a challenging prospect in situations where you and your team are so caught up in fixing the problem that you don't have time to keep the rest of the organization up to date. It's even worse when you simply don't have anything to tell them yet.</p> Data Center Data Explosion Disaster Recovery IT Management Log Analysis IDG Insider Tue, 20 Aug 2013 10:00:00 +0000 Matt Prigge 225209 at http://www.infoworld.com Big data drives high performance for Cars.com http://www.infoworld.com/d/big-data/big-data-drives-high-performance-carscom-207997?source=rss_log_analysis <p>Web businesses have long realized that a direct line can be drawn between revenue and the quality of user experience. Measuring that experience on a wide scale has become a leading big data analytics endeavor, one embraced by Cars.com. By analyzing data from 12 million monthly website visits, the company is optimizing the user experience for its shoppers -- and gaining deep operational insight and fraud prevention capability in the bargain.</p> Applications Big Data Business Intelligence Data Center Security Big Data Application Testing Log Analysis Business Intelligence Security Thu, 29 Nov 2012 11:00:00 +0000 Andrew Lampitt 207997 at http://www.infoworld.com Splunk 5 offers fault-tolerant indexing for mission-critical applications http://www.infoworld.com/d/data-center/splunk-5-offers-fault-tolerant-indexing-mission-critical-applications-206056?source=rss_log_analysis <p>The new version of the Splunk machine data search engine comes with a distributed indexing technology that could save storage costs for those customers running the software as a high-availability service.</p> <p>"The data that is being collected in Splunk is becoming more mission critical," said Sanjay Mehta, Splunk vice president of product marketing, explaining the need for distributed indexing.</p> Data Center Log Analysis Systems Management Business Intelligence Wed, 31 Oct 2012 11:38:10 +0000 admin 206056 at http://www.infoworld.com The 3 biggest mistakes made by security pros http://www.infoworld.com/d/security/the-3-biggest-mistakes-made-security-pros-202053?source=rss_log_analysis <p>Last week, I discussed the <a href="http://www.infoworld.com/d/security/3-security-mistakes-your-management-making-now-201624">three biggest mistakes senior management makes</a> in computer security. This week, let's examine the three biggest mistakes computer security engineers commit -- and have to answer for when they deal with senior management. You'll notice a resemblance between last week's post and this installment. No coincidence there; the issues are similar, though they differ in the details.</p> <p>Let's take a look at the problems.</p> Data Center Security Log Analysis Data Security Malware Security Management Social Engineering Security Tue, 11 Sep 2012 10:00:00 +0000 Roger A. Grimes 202053 at http://www.infoworld.com Splunk Storm brings log management to the cloud http://www.infoworld.com/t/managed-services/splunk-storm-brings-log-management-the-cloud-201098?source=rss_log_analysis <div style="padding: 8px; background: none no-repeat scroll center top #ffffff; position: relative; float: right; width: 243px; height: 182px;"><img src="http://www.infoworld.com/sites/infoworld.com/files/media/image/Cloud_Performance_hp.jpg" alt="Splunk Storm brings log management to the cloud" width="243" height="182" align="right" /></div> <p>Splunk announced today the general availability of Splunk Storm, a cloud-based version of the company's log-management software aimed at helping companies more easily monitor, diagnose, and troubleshoot complex cloud-based applications running an array Application Development Cloud Computing Data Center Application Development Managed Services Log Analysis Tue, 28 Aug 2012 12:00:00 +0000 InfoWorld Tech Watch 201098 at http://www.infoworld.com Secure or not? 10 spot checks will tell you http://www.infoworld.com/d/security/secure-or-not-10-spot-checks-will-tell-you-197928?source=rss_log_analysis <p>I don't know about you, but I can tell in about a minute how much someone I've just met knows about computers, networks, and security. It's in what they say, how they respond, and what they think about particular subjects. I bet most of you can do the same. And like me, I bet you've found these first impressions to be surprisingly accurate.</p> Data Center Security Authentication Log Analysis Insider Threats Network Security Password Security Patch Management Security Tue, 17 Jul 2012 10:00:00 +0000 Roger A. Grimes 197928 at http://www.infoworld.com 5 things CIOs should know about big data http://www.infoworld.com/d/business-intelligence/5-things-cios-should-know-about-big-data-193090?source=rss_log_analysis <p><strong>No. 1: You will need to think about big data</strong><br />Big data analysis got its start from the large Web service providers such as Google, Yahoo, and Twitter, which all needed to make the most of their user-generated data. But enterprises will big data analysis to stay competitive and relevant.</p> Big Data Business Intelligence Data Center Data Explosion Data Management Big Data IT Management Data Modeling Hadoop Log Analysis Tue, 22 May 2012 10:00:00 +0000 admin 193090 at http://www.infoworld.com Event log management made easy http://www.infoworld.com/d/security/event-log-management-made-easy-193577?source=rss_log_analysis <p>When it comes to log management, most administrators follow the traditional route of generating all possible events that might need to be captured, then choosing which events should create actionable alerts. The centralized log management system then picks up, centralizes, and correlates these entries. The result is <a href="http://www.infoworld.com/d/data-center/blogs">information overload</a>, much akin to the log entries generated by the average firewall (you all know <a href="http://www.infoworld.com/d/security/the-firestorm-over-firewalls-193409">how much I love firewalls</a>).</p> Data Center Data Explosion Data Management Security Log Analysis Intrusion Detection Data Management Security Tue, 22 May 2012 10:00:00 +0000 Roger A. Grimes 193577 at http://www.infoworld.com Survey: IT spends too little time analyzing logs for security clues http://www.infoworld.com/d/security/survey-it-spends-too-little-time-analyzing-logs-security-clues-192298?source=rss_log_analysis <p>Relatively few organizations are making good use of gobs of log data they collect for purposes such as identifying attackers, according to a survey of 600-plus IT professionals by <a href="http://www.networkworld.com/topics/security.html" target="_blank">security</a> outfit SANS.</p> Data Center Networking Security Log Analysis Network Monitoring Network Security Security Management Thu, 03 May 2012 19:22:31 +0000 admin 192298 at http://www.infoworld.com What to monitor to stop hacker and malware attacks http://www.infoworld.com/d/security/what-monitor-stop-hacker-and-malware-attacks-189501?source=rss_log_analysis <p>The <a href="http://www.infoworld.com/t/security/verizon-security-report-hacktivism-insider-threats-down-189215">2012 Verizon Data Breach Investigations Report</a> released last week continues to reverberate. The stats that jumped out at me: 96 percent of data breaches were relatively easy for attackers to pull off, and 97 percent of those attacks were easily avoidable.</p> Data Center Security Anti-virus Cyber Crime Log Analysis Data Loss Prevention Data Security Endpoint Protection Security Tue, 27 Mar 2012 10:00:00 +0000 Roger A. Grimes 189501 at http://www.infoworld.com