Click here to close now.


Related Topics: Microservices Expo, Java IoT, Linux Containers, Containers Expo Blog, @CloudExpo

Microservices Expo: Press Release

Logentries Announces Machine Learning Analytics for IT Ops Monitoring

New Cloud Service for Anomaly Detection and Inactivity Alerting Improves System Up-time and Accelerates Issue Resolution

Logentries Announces Machine Learning Analytics for IT Ops Monitoring

Logentries, the most connected log management and analytics service built for the cloud, today announced new Anomaly Detection and Inactivity Alerting to help Dev and IT Ops proactively monitor, troubleshoot and resolve production system issues in real-time. Cloud-based Logentries Anomaly Detection automatically notifies users when abnormal events occur or pattern deviations surpass defined thresholds. Additionally, Logentries users can now create real-time alerting based on the absence of expected events or a shift in system behavior patterns. Using advanced machine-learning technology, the Logentries service is enabling users to proactively detect performance and security issues, and resolve problems more quickly to improve end user experience and overall system and application performance.

As modern systems are increasingly decoupled and distributed, IT and Development Operations teams often lack an effective means to monitor, troubleshoot and resolve potential issues with their production systems. When there is a shift in system behavior, or something abnormal has occurred, it is important to be automatically notified in real-time in order to mitigate potentially serious events or system-wide outages. For example, if a server response time changes from one second to five seconds, but does not generate any standard errors, Operations teams could miss the issue because they did not receive an alert. Logentries' new Anomaly Detection and Inactivity Alerting enables users to easily create a baseline query to extract specific log-based data that they want to monitor and receive alerts on.

"Logentries is quickly expanding the value of log data for our Ops team by not only centralizing and indexing all of our log sources, but now adding an automated log-based approach to monitoring and alerting that helps us to more quickly detect performance and security issues," said Geoffrey Smalling, CTO, 500friends.

With Logentries Anomaly Detection, users can:

  • Set-up real-time alerting based on deviations from important patterns and log events.
  • Easily customize Anomaly thresholds and compare different time periods.
  • Drill into specific field level data, not just generic events.
  • Receive alerts via text message, email, SMS, PagerDuty, HipChat, and Campfire.

With Logentries Inactivity Alerting, users can:

  • Monitor standard, incoming events such as an application heart beat.
  • Receive real-time alerts based on log inactivity (i.e. receive alerts when something does not occur).
  • Monitor systems for specific server performance issues or configuration issues.
  • Monitor application availability 24/7.

"It's particularly important to not only monitor errors in your logs, but proactively recognize where there has been a shift in system behavior," said Trevor Parsons, Co-founder and Chief Scientist, Logentries. "Our Anomaly Detection and Inactivity Alerting adds a new level of sophistication to Logentries that notifies users in real-time when something significantly changes in their system, such as application usage patterns, system response times or server resource consumption."

The cloud-based Logentries service collects and pre-processes log events in real-time for on-demand analysis, alerting and visualization. With custom tagging and filtering, users can correlate security and performance issues with broader infrastructure activity including application usage, server metrics, and user behavior. To learn more about Anomaly Detection, Inactivity Alerting, or to get started today with a free, all-inclusive 30-day trial of the Logentries service, visit

About Logentries
Logentries is the world's most connected log management and analytics service, making business insights from machine-generated log data easily accessible to development, IT and business operations teams of all sizes. With the broadest platform support and an open API, Logentries brings the value of log-level data to any system, to any team member, and to a community of more than 25,000 worldwide users. While traditional log management and analytics solutions require advanced technical skills to use, and are costly to set-up, Logentries provides an alternative designed for managing huge amounts of data, visualizing insights that matter, and sharing that information across its global user community. To sign up for the free Logentries service, visit

More Stories By Trevor Parsons

Trevor Parsons is Chief Scientist and Co-founder of Logentries. Trevor has over 10 years experience in enterprise software and, in particular, has specialized in developing enterprise monitoring and performance tools for distributed systems. He is also a research fellow at the Performance Engineering Lab Research Group and was formerly a Scientist at the IBM Center for Advanced Studies. Trevor holds a PhD from University College Dublin, Ireland.

Latest Stories
Microservices are a very exciting architectural approach that many organizations are looking to as a way to accelerate innovation. Microservices promise to allow teams to move away from monolithic "ball of mud" systems, but the reality is that, in the vast majority of organizations, different projects and technologies will continue to be developed at different speeds. How to handle the dependencies between these disparate systems with different iteration cycles? Consider the "canoncial problem"...
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Container technology is shaping the future of DevOps and it’s also changing the way organizations think about application development. With the rise of mobile applications in the enterprise, businesses are abandoning year-long development cycles and embracing technologies that enable rapid development and continuous deployment of apps. In his session at DevOps Summit, Kurt Collins, Developer Evangelist at, examined how Docker has evolved into a highly effective tool for application del...
We all know that data growth is exploding and storage budgets are shrinking. Instead of showing you charts on about how much data there is, in his General Session at 17th Cloud Expo, Scott Cleland, Senior Director of Product Marketing at HGST, showed how to capture all of your data in one place. After you have your data under control, you can then analyze it in one place, saving time and resources.
The Internet of Things is clearly many things: data collection and analytics, wearables, Smart Grids and Smart Cities, the Industrial Internet, and more. Cool platforms like Arduino, Raspberry Pi, Intel's Galileo and Edison, and a diverse world of sensors are making the IoT a great toy box for developers in all these areas. In this Power Panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists discussed what things are the most important, which will have the most profound...
As organizations shift towards IT-as-a-service models, the need for managing & protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection & E-Discovery of your data - whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise.
Growth hacking is common for startups to make unheard-of progress in building their business. Career Hacks can help Geek Girls and those who support them (yes, that's you too, Dad!) to excel in this typically male-dominated world. Get ready to learn the facts: Is there a bias against women in the tech / developer communities? Why are women 50% of the workforce, but hold only 24% of the STEM or IT positions? Some beginnings of what to do about it! In her Day 2 Keynote at 17th Cloud Expo, San...
PubNub has announced the release of BLOCKS, a set of customizable microservices that give developers a simple way to add code and deploy features for realtime apps.PubNub BLOCKS executes business logic directly on the data streaming through PubNub’s network without splitting it off to an intermediary server controlled by the customer. This revolutionary approach streamlines app development, reduces endpoint-to-endpoint latency, and allows apps to better leverage the enormous scalability of PubNu...
Apps and devices shouldn't stop working when there's limited or no network connectivity. Learn how to bring data stored in a cloud database to the edge of the network (and back again) whenever an Internet connection is available. In his session at 17th Cloud Expo, Ben Perlmutter, a Sales Engineer with IBM Cloudant, demonstrated techniques for replicating cloud databases with devices in order to build offline-first mobile or Internet of Things (IoT) apps that can provide a better, faster user e...
SYS-CON Events announced today that Catchpoint, a global leader in monitoring, and testing the performance of online applications, has been named "Silver Sponsor" of DevOps Summit New York, which will take place on June 7-9, 2016 at the Javits Center in New York City. Catchpoint radically transforms the way businesses manage, monitor, and test the performance of online applications. Truly understand and improve user experience with clear visibility into complex, distributed online systems.Founde...
In today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace. Traditional approaches for driving innovation are now woefully inadequate for keeping up with the breadth of disruption and change facin...
I recently attended and was a speaker at the 4th International Internet of @ThingsExpo at the Santa Clara Convention Center. I also had the opportunity to attend this event last year and I wrote a blog from that show talking about how the “Enterprise Impact of IoT” was a key theme of last year’s show. I was curious to see if the same theme would still resonate 365 days later and what, if any, changes I would see in the content presented.
The revocation of Safe Harbor has radically affected data sovereignty strategy in the cloud. In his session at 17th Cloud Expo, Jeff Miller, Product Management at Cavirin Systems, discussed how to assess these changes across your own cloud strategy, and how you can mitigate risks previously covered under the agreement.
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Most of the IoT Gateway scenarios involve collecting data from machines/processing and pushing data upstream to cloud for further analytics. The gateway hardware varies from Raspberry Pi to Industrial PCs. The document states the process of allowing deploying polyglot data pipelining software with the clear notion of supporting immutability. In his session at @ThingsExpo, Shashank Jain, a development architect for SAP Labs, discussed the objective, which is to automate the IoT deployment proces...