Logentries Free AWS Community Packs Enable Out-of-the-Box Intelligence for CloudTrail and CloudWatch Logs
AWS Community Packs Provide Pre-configured Queries, Alerts, and Dashboards for CloudTrail and CloudWatch Log Monitoring and Analysis
December 4, 2014
Boston, Massachusetts (December 4th, 2014) – Logentries, the leading log management and analytics service built for the cloud, has released two new Community Packs offering out-of-the-box intelligence for AWS CloudTrail and AWS CloudWatch log monitoring and troubleshooting. Logentries AWS Community Packs give AWS users exactly what they need to extract key information and easily correlate the critical performance, security, and systems events.
With only a few mouse clicks, AWS users can turn raw CloudTrail and CloudWatch logs into meaningful insights using the Community Pack dashboards, pre-defined queries and alerts. This insight provides users with immediate understanding of what is occurring across their AWS environment and the important applications running on it. The Logentries and AWS integrations were designed with AWS to offer users quick insight into security and compliance issues; AWS account user activity and tracking; and system performance monitoring and troubleshooting.
“With many of our critical services running on AWS, it is incredibly valuable to have real-time, log-level insight into what is happening across our environment and users,” said Kirill Bensonoff, Co-Founder and Principle at ComputerSupport. “Logentries’ integration with AWS logs provides us with real-time visibility into important server monitoring metrics, as well as exceptions, anomalies, and custom security events that we need to know about as soon as they occur.”
The two new AWS Community Packs for CloudTrail and CloudWatch log collection and analysis include the following “plug and play: features:
Saved Queries: Saved Queries can be used to quickly get visibility into
- AWS account information such as EC2 instance activity, AWS account user activity, and common security events.
- Important resource usage trends such as CPU, Network or I/O of EC2 instances, as well as performance insights into other AWS services (EBS, ELB, DynamoDB, etc.)
Tags and Alerts: Saved Tags and Alerts highlight
- Instances of important AWS CloudTrail events (based on AWS CloudTrail best practices) as well as anomaly detection and inactivity alerts to highlight spikes in important security events, password updates, policy-related events and EC2 instance restarts and terminations.
- Breaches in performance thresholds, spikes in resource usage, and API downtime.
Data Visualizations: Visualizations of log data provide immediate visibility into
- AWS user actions (root and IAMUsers) as well as into the activity of all EC2 instances.
- CPU, Memory and Network usage over time across the entire AWS environment and at a per server instance level.
“Today, thousands of Logentries users are managing CloudTrail and CloudWatch data, and we wanted to offer a set of tools that would reduce the amount of time they need to spend collecting and analyzing their logs,” said Trevor Parsons, Chief Scientist and Co-Founder, Logentries. “By looking across our global Community, we identified the most popular queries, alerts, and dashboards for the AWS environment, and created two Community Packs that would deliver these, instantly.”
The cloud-based Logentries service collects and pre-processes log events in real-time for on-demand analysis, alerting and visualization. With custom tagging and filtering, users can correlate security and performance issues with broader infrastructure activity including application usage, server metrics and user behavior. The Logentries Community Packs can be downloaded in minutes and provides users with immediate access to pre-configured queries with real-time tags, alerts, and data visualization dashboards.
Logentries is the leading log management and analytics service built for the cloud, making business insights from machine-generated log data easily accessible to development, IT and business operations teams of all sizes. With the broadest platform support and an open API, Logentries brings the value of log-level data to any system, to any team member, and to a community of more than 35,000 worldwide users. While traditional log management and analytics solutions require advanced technical skills to use, and are costly to set-up, Logentries provides an alternative designed for managing huge amounts of data, visualizing insights that matter, and sharing that information across its global user community. To sign up for the free Logentries service, visit Logentries.
Recent Press Releases
New Elastic Logging Enhancements Enable Users to Analyze their Docker Log Data Using Dynamic Time-Slice Views to Identify Rare Events & Outlier Issues
New Logentries Community Pack for Puppet Enterprise Enables SysAdmins to Easily Analyze Puppet Event Data
New Puppet Log Analyzer Monitors Puppet Configuration Changes With Out-of-the-Box Queries, Dashboards and Alerting Tools