Our next-gen architecture is built to help you make sense of your ever-growing data. Watch a 4-min demo video!

All Articles

PCI Logging Rules Your Organization NEEDS to Know
10 min

PCI Logging Rules Your Organization NEEDS to Know

For an organization to be compliant with PCI logging requirements, it must follow PCI Requirement 10 of the Payment Card Industry Data Security Standards (PCI DSS)….

10 Ways to Take Your Error Logs Up a Level
7 min

10 Ways to Take Your Error Logs Up a Level

Error logs are the first port of call for any outage. Great error logs provide context and cause to a mysterious, 3am outage. Engineers often treat…

SIEM Tutorial: What should a good SIEM Provider do for you?
7 min

SIEM Tutorial: What should a good SIEM Provider do for you?

Modern day Security Information and Event Management (SIEM) tooling enterprise security technology combine systems together for a comprehensive view of IT security. This can be tricky,…

Are your customers catching production problems 🔥 before you do?
5 min

Are your customers catching production problems 🔥 before you do?

Availability and quality are the biggest differentiators when people opt for a service or product today. You should be aware of the impact of your customers…

Prometheus Federation with Thanos: How Does Thanos Work?
8 min

Prometheus Federation with Thanos: How Does Thanos Work?

Prometheus is the cornerstone of many monitoring solutions, and sooner or later, Prometheus federation will appear on your radar. A well monitored application with flexible logging…

Elasticsearch Hadoop Tutorial with Hands-on Examples
25 min

Elasticsearch Hadoop Tutorial with Hands-on Examples

In this Hadoop Tutorial lesson, we’ll learn how we can use Elasticsearch Hadoop to process very large amounts of data. For our exercise, we’ll use a…

Writing Effective Suricata Rules with Examples [Best Practices]
8 min

Writing Effective Suricata Rules with Examples [Best Practices]

This post will help you write effective Suricata Rules to materially improve your security posture. We’ll begin with a breakdown of how a Rule is constructed…

Improve Elasticsearch Query Performance with Profiling and Slow Logs
10 min

Improve Elasticsearch Query Performance with Profiling and Slow Logs

If our end users end up too long for a query to return results due to Elasticsearch query performance issues, it can often lead to frustration….

The Cloud Network Security Gap
13 min

The Cloud Network Security Gap

Before we dive into the gap in cloud network security, let’s take a step back. If you’ve been in Operations for a while, you might remember…

Where Modern Observability
and Financial Savvy Meet.