Click any tag below to further narrow down your results
Links
This article outlines Zendesk's approach to reducing costs associated with observability data while maintaining essential visibility for engineers. It details their methods for identifying valuable traces and logs, implementing targeted changes, and enhancing cost transparency. The results included significant savings and improved performance monitoring.
This tool converts logs in JSON and logfmt formats into readable outputs, enabling fast analysis of large log files. It offers features like filtering by key/value pairs, timestamp range, and level, along with support for various installation methods across platforms.
This article discusses the importance of intentional logging in software development. It emphasizes logging only what’s necessary for debugging and understanding system behavior while avoiding excessive, meaningless entries that can complicate root cause analysis. The piece also highlights structured logging and the use of modern tools to improve logging practices.
Google AI Studio has launched new logging and datasets features to help developers monitor and improve AI application performance. By enabling logging, developers can track API calls, analyze user interactions, and create datasets for testing and refinement. This streamlines debugging and enhances the overall quality of AI outputs.
DetonatorAgent is a tool designed for Red Teamers to execute files and collect EDR logs during security assessments. It helps determine if malware remains undetected and works alongside RedEdr to improve testing reliability. The agent operates via a REST API and allows for the execution of various file types while capturing relevant EDR alerts.
This article explains how to configure Octopus to send audit logs to an Elastic stack using OpenTelemetry and the EDOT Collector. It provides step-by-step instructions for setting up the necessary components, including Docker containers and configuration files. The goal is to enhance monitoring and auditing capabilities for Octopus deployments.
AWS has upgraded CloudWatch to consolidate operational, security, and compliance logs from multiple accounts and sources into a unified platform. The new features support querying logs directly in Amazon S3 without ETL, making it easier for organizations to manage their log data while reducing costs and complexity. However, there are concerns about vendor lock-in as it ties users closely to the AWS ecosystem.
Nubank faced challenges with its external logging vendor as it scaled, leading to high costs and limited control. The engineering team built an in-house logging platform in two phases, focusing on ingestion and storage, to enhance reliability, scalability, and cost efficiency.
This article outlines how to handle sensitive information in logs when using Amazon CloudWatch. It discusses techniques like data masking and access control to protect personally identifiable information (PII) while maintaining operational efficiency. The post also details implementing AWS IAM policies for secure log access.
This article explains how to set up a centralized logging system for AWS CloudFormation StackSets across multiple accounts. It outlines the architecture, implementation steps, and monitoring capabilities to streamline deployment tracking and troubleshooting.
This article discusses improvements to Cloudflare's Web Application Firewall (WAF) payload logging feature, which helps identify the specific request fields that trigger WAF rules. It highlights how recent updates increase logging efficiency and clarity, reducing false positives and enhancing debugging for customers.
The author logs and analyzes 67 bugs from their personal software projects throughout 2025, focusing primarily on Python. They explore common mistakes and the effectiveness of tools like Pyright, while discussing lessons learned and plans for improvement.
This article explains how to use Amazon EventBridge to filter and monitor specific events from Amazon Elastic Container Service (ECS). It details setting up rules to capture relevant event data, reducing noise, and managing costs effectively in container operations.
This article details Yelp's approach to handling S3 server access logs at scale. It discusses the challenges of logging, the benefits of object-level logging for debugging and security, and the architecture used to optimize log storage by converting them into a more efficient format.
This article critiques traditional logging methods that lack the context needed for effective debugging. It advocates for structured logging through wide events, which capture comprehensive details of each request, making it easier to identify and resolve issues.
This article explores open-source solutions for defending against application-layer DDoS attacks and malicious web bots. It highlights the capabilities of Tempesta FW, including its fingerprinting methods and log management with ClickHouse for effective traffic analysis.
LaunchDarkly provides a platform for managing software feature rollouts independently from code deployments, enhancing safety and security. The article also highlights user Boris Gorelik for his insightful question on Python's logging system.
The author reflects on their initial disdain for systemd, which replaced traditional init systems and introduced a binary logging format, but ultimately concludes that systemd has been a successful evolution in process management for Linux. They highlight its backward compatibility, improved logging, scheduling, and enhanced security features, arguing that it has addressed many shortcomings of previous init systems and brought valuable new functionality.
The article discusses the importance of keeping sensitive information out of logs to prevent data leaks and enhance security. It emphasizes implementing best practices for logging, such as avoiding the logging of sensitive data and using encryption to protect log files. Additionally, it highlights the need for regular audits to ensure compliance with privacy regulations.
ShareChat transitioned from open-source Kafka to WarpStream to optimize their machine learning logging and handle their highly elastic workloads more efficiently. By adopting WarpStream's stateless architecture, ShareChat achieved significant cost savings and improved scalability, eliminating inter-AZ networking fees and reducing operational complexities associated with Kafka. The article details their testing results, showing WarpStream's advantages in throughput and cost-effectiveness compared to traditional Kafka setups.
The article covers how to implement logging in Node.js applications using the Pino library, focusing on its performance benefits and ease of use. It provides a step-by-step guide on setting up Pino for effective logging, including configuration and best practices. Developers can enhance their application's logging capabilities by leveraging Pino's features.
A connection pool leak in a Rails application was traced back to the logger holding onto a database connection due to the accidental passing of an ActiveRecord relation, which evaluated within a thread causing connection exhaustion. The resolution involved modifying the logging to only include primitive values and highlighted the importance of careful logging practices and monitoring connection usage.
OpenAIPot is a deceptive API gateway designed to detect unauthorized usage of OpenAI API keys by acting as a honeypot. It forwards legitimate requests while injecting deceptive content for lure API keys, incorporates security controls such as IP allowlisting and rate limiting, and offers comprehensive logging for monitoring and analysis of potential attacks.
Microsoft has introduced container network logs in the public preview of Advanced Container Networking Services for Azure Kubernetes Service, providing detailed insights into network traffic. This feature enhances troubleshooting, security enforcement, and operational efficiency by monitoring various traffic layers and offering two modes of log storage. Users can visualize logs through Azure managed Grafana dashboards for better analysis and monitoring.
AmazingPrint is a Ruby library that enhances the pretty-printing of Ruby objects with full color and proper indentation, making it a suitable replacement for the now-stale AwesomePrint. It supports Rails ActiveRecord objects and includes customizable options for formatting output, including the ability to log formatted data and use it within Rails templates. Installation is straightforward via Ruby gem or cloning the repository from GitHub.
Multitenant logging in Container Insights allows customers using AKS to segregate container logs by different teams, enabling each team to access logs from their specific Kubernetes namespaces and manage billing in separate Log Analytics workspaces. The article outlines the scenarios supported, how to configure multitenancy using Data Collection Rules (DCRs), and steps for onboarding and managing these settings in an AKS cluster.
OpenTelemetry is an open-source observability framework designed to provide a standardized way to collect, process, and export telemetry data such as traces, metrics, and logs. It aims to help developers and organizations gain insights into their systems' performance and behavior, facilitating better monitoring and troubleshooting. By integrating with various backend systems, OpenTelemetry enhances observability across diverse environments and applications.
AWS detection engineering practices were critically assessed after a breach simulation revealed undetected attacker persistence. The team rebuilt their detection capabilities by focusing on key log sources like CloudTrail, VPC Flow Logs, and GuardDuty, emphasizing the importance of correlation across these sources for effective threat detection.
Detecting ransomware in Amazon S3 is complex due to the limitations of existing logging tools and the default configurations of AWS services. The article outlines various ransomware techniques, their detection methods, and the necessary logging configurations to improve security against such threats. It also introduces YES3, an open-source tool designed to help identify S3 access issues and enhance ransomware prevention controls.
Kubetail is a real-time logging dashboard designed for Kubernetes, allowing users to merge logs from multiple containers into a single timeline accessible via a web interface or terminal. It utilizes the Kubernetes API to fetch logs and track container lifecycle events, ensuring that users can seamlessly follow logs as containers start and stop. The tool offers various filtering options and can be installed easily on different platforms.
The article discusses the concept of CloudTrail logging evasion in AWS, emphasizing the importance of policy size when creating effective logging mechanisms. It highlights how attackers can exploit insufficiently sized policies to avoid detection and the need for robust configurations to enhance security.
LogTape is a versatile logging library for JavaScript and TypeScript that operates across multiple environments, including Deno and Node.js, without any dependencies. It features structured logging, hierarchical categories, template literals for messages, and built-in data redaction, making it suitable for both applications and libraries. The library is available through various package managers and includes a monorepo with additional packages for extended functionalities.
Sentry has announced the general availability of its logging feature, which allows developers to collect, analyze, and manage logs seamlessly alongside their error tracking. This integration enhances observability and simplifies the troubleshooting process by providing a unified view of application health and performance. The new feature aims to improve developers' workflows and enhance their ability to monitor and respond to issues effectively.
Preparing for cloud incidents requires a strategic approach to logging across major cloud providers. This article ranks essential logs for Microsoft, AWS, and Google Cloud, providing insights on their criticality for detecting and responding to security incidents, as well as real-life case studies illustrating their importance. Ensuring the right logs are enabled and retained is vital for effective incident response.
KIEMPossible is a tool that aids in Kubernetes Infrastructure Entitlement Management by providing visibility into permissions and their usage, promoting the principle of least privilege. It supports dynamic and static concurrency limits, log ingestion settings, and generates reports on unused dangerous permissions and workloads. The tool requires specific environmental variables and permissions for integration with AWS, Azure, and GCP services.
Character.AI has transformed its fragmented logging system into a centralized one, significantly improving query speeds and enabling real-time visibility for developers. By selectively capturing logs and introducing new features like live tailing and keyword search, the company aims for metric unification to enhance observability and support future growth.
Pinterest's Big Data Platform team has developed Moka, a next-generation data processing platform deployed on AWS Elastic Kubernetes Service (EKS). The article outlines Moka's infrastructure, including its logging and observability strategies, which leverage tools like Fluent Bit for log management and Prometheus for metrics storage and monitoring. Key learnings and future directions for Moka's development are also discussed.
The author discusses the benefits of using AI for writing logs, particularly highlighting JetBrains’ Full Line Code Completion feature in PyCharm. This tool streamlines the logging process, reduces cognitive overhead, and enhances debugging efficiency by inferring log statements based on context. The article outlines the technical foundations of the AI model used and praises its thoughtful implementation for developers.
The document appears to be corrupted or improperly formatted, making it impossible to extract coherent content or insights regarding logging best practices. No useful information can be derived from the current text as it contains a significant amount of unreadable characters and symbols.
EulerHS is a free monadic framework designed for building concurrent backend and console applications in Haskell, integrating essential subsystems like SQL databases and logging while ensuring exception safety. The framework supports various testing mechanisms and has been successfully utilized in production by Juspay, demonstrating its effectiveness and reliability in managing business logic through a clear application architecture.
HyperDX is a powerful tool integrated with ClickStack that enables engineers to efficiently search and visualize logs, metrics, and traces on any ClickHouse cluster. It supports full-text search, alert setup, and real-time logging, while also offering compatibility with OpenTelemetry for various programming languages. The platform aims to simplify observability and improve the debugging process for production issues.