Introducing Humio How-To Guides

Taking a deeper look at log management

May 26th, 2020

Our engineers are constantly working behind the scenes to adapt Humio to a variety of use cases. In their work, they’ve generated a base of knowledge that may be useful to a wider audience. In the spirit of supporting curiosity and discovery, we’re adapting their insights in a new series of How-To Guides.

Our How-To Guides provide an in-depth look at log management, revealing what is going on behind the user interfaces, and generating insights that will help you improve your own system. To kick-off this series, we have three all-new How-To Guides:


How to improve application monitoring (APM) with modern log management

Explore how log management enhances application performance monitoring (APM), addressing the challenges of continuous change, increased complexity, and informing all stakeholders. Log management provides a single hub for all data that can complete observability across the app development space. It cuts down on Mean Time To Repair (MTTR) by providing details that APM tools can miss. Learn more about the role of log management working with APM services by reading How to Improve Application Monitoring with Modern Log Management.

  • Challenges in managing microservice apps

  • Log management and APM: better together

  • 5 steps to troubleshoot apps with log management and APM together

  • Tips & Tricks

How to use log management as the foundation of the security stack

Engineered for efficiency, log management can be deployed as a customizable threat monitoring tool in its own right or used to enhance a SIEM by providing real-time access to incoming data. Log management can enhance the core features of a SIEM as the most cost-effective means of gathering, storing, and searching security data. Log management can capture data SIEMs have filtered out and provide a more complete observability picture. Learn how to empower your security with real-time data by reading How to Use Log Management as the Foundation of the Security Stack.

  • Log management creates a strong foundation for security data

  • Challenges managing SIEMs

  • 5 steps to use log management to monitor and react to security issue

  • Run log management alongside a SIEM

  • Tips & Tricks

How to optimize the stack with cloud storage

Migration to the cloud provides the opportunity for unlimited scalability, but it also presents constant cost-managing, performance, and security challenges. See how to eliminate excessive costs by using the least expensive option of storage - object storage. We’ll also provide tips for removing network-slowing bottlenecks while preserving encryption and security. Learn how to get the most out of an AWS cloud environment by reading How to Optimize the Stack with Cloud Storage.

  • Types of cloud storage

  • Challenges using cloud storage

  • 5 Steps to optimize a stack with cloud storage

  • Tips & Tricks

Let us know what you think or contact us with suggestions for future How-To guides by tweeting at us @MeetHumio.

More about Humio

Humio encourages exploration by giving our users instant access to their data. The design of Humio’s high-performant log management search reflects this with pipelining language that can be learned in a day, data widgets that generate in a couple of clicks, and graphically rich dashboards that provide real-time information at a glance. Unlike open-source log management options that require constant maintenance and staff on hand to keep them up and running, Humio requires virtually no upkeep.

For specific questions about Humio not answered in our How-To Guides, you can find answers on our docs site and public Slack channel.