SAN FRANCISCO, CA--(Marketwired - Nov 13, 2013) - Loggly expanded its native support for Amazon Web Services (AWS) users today by releasing an update to its most-popular cloud-based log management service. The enhanced Loggly service has added support for AWS CloudTrail, the new service announced by AWS this morning at AWS re:Invent, to provide customers faster and deeper insight into potential cloud-application security, compliance and performance issues.
AWS CloudTrail delivers a record of AWS API calls made on AWS customer deployments. The data is valuable because it provides an audit trail of modifications to and interactions with AWS-hosted deployments. By integrating its service with AWS CloudTrail, over 3,500 Loggly customers -- many of which host data and applications in the AWS cloud -- can view users' AWS API activity directly within Loggly's application, streamlining search and analysis of logs and enabling alerts in real-time, at no additional charge.
In Loggly, companies that have subscribed to AWS CloudTrail can now customize dashboards showing user activity or receive alerts on unusual activity from a particular source IP, for instance, to prevent security incidents. The service could also potentially prevent fraud or other unauthorized activity across an AWS deployment.
Built as an extension of the Loggly Gen2 platform launched in September, Loggly automatically parses and indexes AWS CloudTrail data and delivers dashboards showing changes, including who is creating and terminating AWS instances. Users can customize the dashboards to highlight any category data, such as changes coming from a particular region or within a particular application, and includes point-and-click charting capabilities to drill down into data points. IT managers can now answer question like:
- What actions did a user take over a given period of time?
- Which AWS user has taken actions on a particular resource over a given time period?
- What is the source IP address of a given activity?
- Which user activities failed due to inadequate permissions?
- Which user changed the settings of a security group and when did the change occur?
- Which user launched or terminated an EC2 instance?
"AWS CloudTrail data provides an expanded view of AWS user activity, previously more challenging to capture," said Leila Tudury, Director of Product Management at Loggly. "Without Loggly, the volume of AWS CloudTrail data -- and its format -- make visibility challenging. Loggly natively distills AWS CloudTrail data into an easily consumable format so that customers can use it to address security and compliance issues and to resolve real operational problems."
Existing Loggly customers that sign up for AWS CloudTrail will have access to the updated Loggly service as part of their Loggly subscription, at no additional charge. For a free trial of Loggly, including access to the AWS log analysis service, register at the Loggly homepage. For more information on the AWS CloudTrail offering, read our blog, or meet us at booth #821 at AWS re:Invent.
Loggly is the world's most popular cloud-based log management solution, used by more than 3,500 happy customers to effortlessly spot problems in real-time, easily pinpoint root causes and resolve operational issues faster to ensure application success. Founded in 2009 and based in San Francisco, the company is backed by Trinity Ventures, True Ventures, Matrix Partners, Cisco, Data Collective Venture Capital and others. Visit the Loggly website: loggly.com. Follow @loggly on Twitter.