In our previous post, we discussed the performance of syslog-ng, streaming logs to HDFS destinations. Now we’ll pick up where we left off, and continue our performance evaluation with the Kafka.
In our Kafka tests, we used syslog-ng Premiu...
A couple weeks ago our CTO, Balázs Scheidler reflected on the importance of central log management, an approach that we have been advocating for a long time and was also underpinned by a recent report by Gartner.
Having spent the past week at …
If you operate web servers, you want to have insight about your traffic. Traditional solutions to process access logs include:
scripts to create nightly reports with tools like AWStats
run a JavaScript snippet on each page load, like Google Analytic…
This is a guest post by Fabien Wernli (faxm0dem). He has been administering Linux clusters at the Computing Centre of the National Institute of Nuclear Physics and Particle Physics (CC-IN2P3) for 10+ years. Among others, he is an expert on performanc…
Hadoop and Kafka are part of modern high speed data management, and syslog-ng has been supporting these destinations for some time now, as it’s an integral part of a versatile central log management solution. Seamless integration is great, but ...
The role of Central Log Management
With the increased reliance on analytics to drive security operations, IT security professionals are paying particular attention to one of the oldest tools in their toolbox, log management. A recently released repor…
I spent the weekend at Free and Open Source Software Developers’ European Meeting, or as it is better known: FOSDEM – as I did in the past several years as well. This time I delivered two presentations on syslog-ng, and as usual, I spent ...
syslog-ng users often face the challenge of not being able to send logs over the network from one syslog-ng instance to another. There can be many reasons for this; some are independent from syslog-ng, while others are related to the syslog-ng config…
Last week, news came out that unprotected MongoDB databases are being actively compromised: content copied and replaced by a message asking for a ransom to get it back. As The Register reports: Elasticsearch is next. Learn how syslog-ng can hel...
Last week, I described why and how to install the latest stable syslog-ng RPM packages. There are some situations, when even the latest stable release is not good enough. If you have any issues with the latest stable release, there is a good chance t…
Today we’re announcing syslog-ng Premium Edition 7, our latest stable release for syslog-ng PE. This release is primarily for customers using syslog-ng PE as a log collection and log routing tool front-ending SIEM solutions and big data de...
With its latest 4 F6 feature release, you can deploy syslog-ng Store Box (SSB) on Amazon Web Services (AWS) using a bring-your-own license. Running SSB in AWS brings you the obvious benefits of running an application in the cloud, the most notab...