What is log analytics? | Definition from TechTarget (2024)

What is log analytics? | Definition from TechTarget (1)

By

  • Alexander S. Gillis,Technical Writer and Editor

What is log analytics?

Log analytics is the assessment of a recorded set of information from one or more events, captured from a computer, network, application operating system (OS) or other IT ecosystem component. An organization can use log analytics to uncover patterns in user behaviors, identify problems, audit security activities or ensure compliance with established rules, and plan for capacity or IT infrastructure changes.

An Event is an identifiable or significant occurrence within hardware or software, and the information about it is recorded in a log. A user or computer system can generate an event. For example, a server hardware failure is an event.

Organizations rely on tools, such as Windows Event Viewer for Windows OS or the application SolarWinds Security Event Manager, to access, view and analyze logs.

Log analytics software collects and parses error logs to help an organization diagnose an issue: what caused the problem, where it is located and how serious it is. Log analytics can also aid a user to determine trends in an application's or system's operation. Log analytics tools aggregate logs from disparate data sources, compiling a view of the widespread operation of an IT ecosystem.

How log analytics works

Log analytics software collects logs from events, such as application installation, security breaches, and system setup and startup operational information. An example security event is a system login attempt. An example operational event is when an application opens successfully. Setup events focus on the control of domains, such as where a log is stored after a disk configuration. System events focus on components such as the central processing unit (CPU) and storage.

A log entry includes such information as the date and time the event occurred, the computer the event occurred on, an identification of the user, the category of the event -- such as setup or security -- and the program that initiated the event.

Log analytics occurs by organizing data via pattern recognition, classification and tagging, correlation analysis, and artificial ignorance. Pattern recognition compares incoming events with past events to determine which new occurrences will be significant. Classification and tagging puts events into ordered classes and assigns a keyword to each event to describe it in a standardized way. Correlation analysis can sort logs by warning events and then alert administrators to a widespread system error if a critical warning appears in multiple logs. Artificial ignorance, a machine learning program, discards log entries that occur regularly. It helps reduce noise and find uncommon events. Artificial ignorance is well suited to a system that operates consistently with a low number of issues.

Each system that generates log messages writes them in a way that is specific to itself, so log analytics software must pull everything under cohesive terminology. For example, one application logs a moderate software failure event as a warning, while another application labels the same event as an error.

Log analytics tool features and products

A log analytics tool performs log aggregation and gives users a query language to glean insights from the collected information. Log analytics tools can also automatically process logs for insights into specific events, or perform deeper analysis to extract meaningful conclusions or make predictions about the pattern of events taking place over time.

These tools typically tier events by level of urgency. For example, Windows Event Viewer uses information, warning, error and critical urgency levels. Information is the least severe log entry, typically for successful events. Warnings give attention to potential issues, but do not indicate that something needs to be fixed. Error-level events occur when an application starts to fail unexpectedly. A critical error happens when a program is forced to stop and can no longer run properly without further attention.

Log analytics tools commonly offer graphical user interface dashboards that display the most relevant and critical information gleaned from log input. A dashboard might include a total count of events, alerts, log search queries, graphs, and filters for security or change management. Graphs can show statistics on disk space, CPU status and event categories. Some dashboards are customizable.

Log analytics tools commonly include search functionality, which helps users find logged events. For example, if a log analytics tool uses classification and tagging, then the user can quickly search for a specific event by the given keyword.

A sampling of log analytics products includes DataSet, SolarWinds Security Event Manager and Microsoft Azure Log Analytics.

DataSet, formerly Scalyr, is marketed as a DevOps log monitoring and analysis tool because it consolidates logs for diagnosis and visualization from applications and systems. DataSet can filter out user-specified logs as well as graph metrics to show statistics such as percentiles, rates, distributions and trends.

SolarWinds Security Event Manager (SEM) is an example of a tool with a customizable dashboard. It can show data used by multiple accounts and filter events tied to security. SEM can alert users upon a warning event, which can be specified by the user. The dashboard can also contain a word cloud -- a chart showing where the most logs are generated.

Azure Log Analytics, not to be confused with the term log analytics, is part of a public cloud offering. It can be accessed independently or through other Azure products, such as Azure Security Center. Azure Log Analytics can analyze virtual machines via agents as well.

This was last updated in March 2023

Continue Reading About log analytics

  • How to approach IT logging in the cloud vs. on premises
  • 3 log analytics use cases set better ops in motion
  • Employ log management best practices to better analyze, protect data
  • How to perform WVD monitoring with Azure Log Analytics

Related Terms

Type 2 hypervisor (hosted hypervisor)
A Type 2 hypervisor is a virtual machine (VM) manager that is installed as a software application on an existing operating system...Seecompletedefinition
What is high availability (HA)? Definition and guide
High availability (HA) is the ability of a system to operate continuously for a designated period of time even if components ...Seecompletedefinition
What is SaaS sprawl?
SaaS sprawl is the uncontrolled use of software-as-a-service applications within an organization.Seecompletedefinition

Dig Deeper on IT systems management and monitoring

  • Windows event logBy: KinzaYasar
  • How to select a security analytics platform, plus vendor optionsBy: PaulKirvan
  • How to use Microsoft Sentinel with Office 365 to find risksBy: LiamCleary
  • Observability data finds its way into BizDevOpsBy: BethPariseau
What is log analytics? | Definition from TechTarget (2024)
Top Articles
6 Hallmarks of High Performing Teams. #performancemanagement
Commingling Funds
Nullreferenceexception 7 Days To Die
Uti Hvacr
Ofw Pinoy Channel Su
Die Windows GDI+ (Teil 1)
Northern Whooping Crane Festival highlights conservation and collaboration in Fort Smith, N.W.T. | CBC News
David Packouz Girlfriend
Bank Of America Appointments Near Me
Remnant Graveyard Elf
Www.paystubportal.com/7-11 Login
R Tiktoksweets
Saberhealth Time Track
Bahsid Mclean Uncensored Photo
Hilo Hi Craigslist
Lake Nockamixon Fishing Report
Is Grande Internet Down In My Area
Vanessawest.tripod.com Bundy
Stardew Expanded Wiki
Crawlers List Chicago
Pickswise Review 2024: Is Pickswise a Trusted Tipster?
Magic Seaweed Daytona
eugene bicycles - craigslist
TMO GRC Fortworth TX | T-Mobile Community
Pokémon Unbound Starters
Cvs Sport Physicals
Noaa Marine Forecast Florida By Zone
Mia Malkova Bio, Net Worth, Age & More - Magzica
Missing 2023 Showtimes Near Grand Theatres - Bismarck
Broken Gphone X Tarkov
Indiana Wesleyan Transcripts
4083519708
Latest Nigerian Music (Next 2020)
Uc Santa Cruz Events
Pokemon Reborn Locations
Froedtert Billing Phone Number
303-615-0055
Mudfin Village Wow
11 Best Hotels in Cologne (Köln), Germany in 2024 - My Germany Vacation
Pain Out Maxx Kratom
Citymd West 146Th Urgent Care - Nyc Photos
Television Archive News Search Service
BCLJ July 19 2019 HTML Shawn Day Andrea Day Butler Pa Divorce
Europa Universalis 4: Army Composition Guide
A rough Sunday for some of the NFL's best teams in 2023 led to the three biggest upsets: Analysis
Ewwwww Gif
Pronósticos Gulfstream Park Nicoletti
Wera13X
Solving Quadratics All Methods Worksheet Answers
O'reilly's On Marbach
Latest Posts
Article information

Author: Manual Maggio

Last Updated:

Views: 5475

Rating: 4.9 / 5 (69 voted)

Reviews: 92% of readers found this page helpful

Author information

Name: Manual Maggio

Birthday: 1998-01-20

Address: 359 Kelvin Stream, Lake Eldonview, MT 33517-1242

Phone: +577037762465

Job: Product Hospitality Supervisor

Hobby: Gardening, Web surfing, Video gaming, Amateur radio, Flag Football, Reading, Table tennis

Introduction: My name is Manual Maggio, I am a thankful, tender, adventurous, delightful, fantastic, proud, graceful person who loves writing and wants to share my knowledge and understanding with you.