Synology: Enabling HTTPS Everywhere
To conclude my series of posts on Synology I would like to cover another important aspect of securing your data: HTTPS. In this post, I…
To conclude my series of posts on Synology I would like to cover another important aspect of securing your data: HTTPS. In this post, I…
Time machine is a great piece of backup software that comes with Macs. How Time Machine works is that it backs up based on a…
A while ago, I talked about what unsupported means. In this post, I will talk about how performing an unsupported change can negatively impact your…
A commonly requested feature in Log Insight is the ability to blacklist incoming events. In this post, I will suggest a workaround to get this…
I recently heard of an issue where multiple nodes from a Log Insight cluster had become disconnected. The steps performed in an attempt to resolve…
I have been asked a few times why a content pack does not return any results. The actual symptoms of the problem often vary between:…
I have received some questions around agent configuration that I wanted to clear up. Read on to learn more!
I have spent the last three weeks talking about the new agent parsing feature in Log Insight 3.0. I wanted to wrap-up by discussing why…
As mentioned in my last post, Log Insight 3.0 features agent groups. Agent groups are powerful, because they allow server-side configuration management of agent configuration.…
Now that I have talked about the new agent parsers functionality and walked through each of the supported parsers in 3.0, I want to talk…