Continuing with my video theme, I have a video going through the initial configuration wizard of Log Insight 2.0 when attempting to create a standalone instance.
When deploying Log Insight, you have the option of selecting various deployment sizes. By default, Log Insight defaults to small. The best practice for production workloads is to deploy at least medium and whenever possible large. You will notice that by default and even with the larger deployment sizes that Log Insight allocates just over […]
I recently covered the newly supported VIDM integration in Log Insight 4.3. In this post, I would like to focus on the “Redirect URL Host” option to discuss how it works and what is required to make it work properly. Read on to learn more.
Now that Log Insight has moved to VMware Identity Manager (VIDM) as the means to attain Active Directory (AD) authentication, I have heard a lot of questions around how to deploy and configure VIDM. In this post, I will provide the details you need to know. Read on to learn more!
A few months back, I blogged about Log Insight GET configuration APIs. At the time, my goal was to provide a set of BASH functions that could be used to call Log Insight APIs and also to provide some minimum documentation on the Tech Preview configuration APIs in Log Insight 3.6. For one of my […]
I am happy to announce that official API documentation has been released and is available on both the Log Insight 3.3 and Log Insight 3.6 documentation landing pages! Log Insight has always featured ingestion API documentation in the official product documentation. In Log Insight 3.3, a supported authentication and query API were made available in addition […]
Log Insight notifies users when it is unable to maintain the defined retention period by sending a system notification. In this post, I would like to walk through what the system notifications mean in a clustered environment. Read on to learn more!
Time machine is a great piece of backup software that comes with Macs. How Time Machine works is that it backs up based on a policy until there is no space left on the destination. When space is depleted, Time Machine deletes the oldest backups. While the process makes sense, it does raise the question […]
Now that you know all about the Log Insight 3.0 agent parsers, it is time for a quiz! Read on to learn more.
Log Insight 3.0 agents support SSL for both the cfapi and syslog protocols. In this post, I will discuss how to configure the agents to properly communicate over SSL.