Operations | Monitoring | ITSM | DevOps | Cloud

Elasticsearch Text Analysis: How to Use Analyzers and Normalizers

Elasticsearch is a distributed search and analytics engine used for real-time data processing of several different data types. Elasticsearch has built-in processing for numerical, geospatial, and structured text values. Unstructured text values have some built-in analytics capabilities, but custom text fields generally require custom analysis. Built-in text analysis uses analyzers provided by Elasticsearch, but customization is also possible.

Monitoring UV sensors on the International Space Station with Grafana

In space, there’s no atmosphere to protect against the sun’s ultraviolet radiation. Astronauts in orbit are exposed to the equivalent of eight X-rays a day, and the space stations and suits that protect them degrade over time due to radiation and other factors. Scientists working on the International Space Station (ISS) want to know more about ultraviolet (UV) radiation in orbit so they can design better materials.

Correlate CrowdStrike Data with Logz.io Cloud SIEM

Crowdstrike is an innovator in the endpoint protection market with innovative approaches for the last decade. They specialize in depth of data collection and have uncovered many forensic mysteries in security over the last 10 years. We have many mutual customers with CrowdStrike, which is why we began working with them on a solution to analyze and correlate their data within Logz.io.

Kaseya VSA Cyberattack: A Statement on Solidarity from N-able CSO Dave MacKinnon

The recent Kaseya VSA cyberattack is an important reminder of how security works best when we approach it as a community. The adversarial pivot to supply chain-based attacks for delivering ransomware underscore the role we all must play in helping to keep each other protected.

How to Monitor Logs Guide With Recommended Automated Tools

Log monitoring is a practice used by IT administrators to organize, analyze, and understand a network’s performance. All network devices, including applications and hardware, create logs as they perform operations. Logs are like a device’s diary—they record every event and its critical information like user IP address, date and time, request time, and more.