Expanding upon my last post on Log Insight server best practices, in this post I would like to discuss Log Insight agent — client-side and server-side — best practices.
A pretty common question I get asked are what are the best practices when deploying/configuring Log Insight? While the information is available in the official documentation. There is no consolidated list available. In this post, I will list what I consider to be the best practices.
In my last post, I covered the new query API available in Log Insight 3.3. If you read the post then you can see there is a lot of information and while some examples were provided, it may not be easy to understand the basics of the API. In this post, I would like to […]
The title of this post may make it sound like upgrades are difficult in Log Insight, but actually Log Insight is one of the easiest products to upgrade! From time to time you may experience an error and this post will explain what the errors mean, why they occur, and some best practices to prevent […]
I have covered Log Insight reference architectures in the past, but I have received a few inquiries about large Log Insight deployments. In this post, I will cover a variety of different large Log Insight deployments and the reference architecture information you need to know. Read on to learn more!
I have not talked about Log Insight querying in a long time primarily because it has not changed. One thing I touched about in my query building series was suffix searching, or put another way searching for a keyword that ends with a fixed keyword. In this post, I would like to show how you […]
The question of whether Log Insight supports deployment on vSphere stretched clusters has come up multiple times in the last few months. As such, I figured I would cover it in this post. Read on to learn more!
In my last post, I covered the new user alerts administration page in Log Insight 4.0. On that page, you may have noticed alerts from the mysterious VCOPS_* user. In this post, I would like to explain why the VCOPS_* user may exist and why you should not modify alerts from that user. Read on […]
As many of you know, I lead Log Insight’s Customer-Oriented R&D or CORD team. From time-to-time I get asked what that means so I figured I would write about it.
Log Insight has always been able to handle all the events within your environment, but now that it has Role-Based Access Control (RBAC) you can use a single instance to handle all roles within your organization. In this post, I will cover the new RBAC functionality and all the best practices. UPDATE: This feature was […]