ChaosSearch

Founded in 2017. Privately Held.

External links: homepage | docs | blog | jobs | youtube | twitter | linkedin

Data indexing for input into analytics.

Blog posts published by month since the start of

93 total blog posts published.

Switch to word count

Blog content

post title author published words HN
Understanding Security Log Analytics vs. SIEM for Midsized Companies Targeted by Cybercriminals Dave Armlin Jul. 25, 2024 1366 -
Logs vs. Events: Exploring the Differences in Application Telemetry Data David Bunting Jun. 08, 2023 1016 -
Top Security Data Types: Exploring the OCSF Framework David Bunting May. 02, 2024 1595 -
Six Most Useful Types of Event Data for PLG David Bunting Jul. 06, 2023 1994 -
A Simplified Guide to Cloud Data Platform Architecture David Bunting Jan. 12, 2023 1713 -
Data Lake Architecture & The Future of Log Analytics Dave Armlin Jun. 15, 2023 1958 -
3 Straightforward Pros and Cons of Datadog for Log Analytics Dave Armlin Jan. 04, 2024 1680 -
ChaosSearch Pricing Models Explained André Rocha Apr. 03, 2023 922 -
The Ultimate Guide to ELK Log Analysis George Hamilton Sep. 08, 2023 2259 -
How MDR Services Can Optimize Threat Intelligence David Bunting Aug. 08, 2024 1293 -
Data Lake vs Data Warehouse Thomas Hazel Aug. 31, 2023 2230 -
AWS vs GCP: Which Cloud Service Logs Can Provide the Most Valuable Data to Improve Your Business David Bunting Jun. 06, 2024 1726 -
5 ELK Stack Pros and Cons Thomas Hazel Jul. 27, 2023 1972 -
Process, Store and Analyze JSON Data with Ultimate Flexibility Sandro Lima Mar. 21, 2024 1658 -
How to Get Started with a Security Data Lake David Bunting Aug. 29, 2024 1431 -
How to Calculate Log Analytics ROI David Bunting Apr. 12, 2024 1457 -
Innovating Security with Managed Detection & Response (MDR) and ChaosSearch David Bunting Jun. 20, 2024 1145 -
3 Reasons Why You Need an Embedded, Modern Database David Bunting Nov. 30, 2023 893 -
From Legacy to Future-proof: Transforming Your Enterprise Data Architecture Dave Armlin Sep. 05, 2024 1892 -
How Gaming Analytics and Player Interactions Enhance Mobile App Development David Bunting Aug. 17, 2023 1438 -
Understanding Amazon Security Lake: Enhancing Data Security in the Cloud David Bunting Jul. 13, 2023 876 -
ELK Stack Costs Add Up: Here’s How to Switch David Bunting Feb. 01, 2024 2489 -
The Top 5 Security Logging Best Practices to Follow Now David Bunting Jul. 18, 2024 1174 -
6 Threat Detection Challenges for MDRs and How to Overcome Them David Bunting Aug. 23, 2024 1456 -
3 Effective Tips for Cloud-Native Compliance David Bunting Mar. 17, 2023 1301 -
Why Organizations are Using Grafana + Loki to Replace Datadog for Log Analytics David Bunting Apr. 18, 2024 2280 -
5 Ways to Use Log Analytics and Telemetry Data for Fraud Prevention David Bunting Apr. 27, 2023 1461 -
How to Build a Culture of Data-Driven Product Management David Bunting Apr. 13, 2023 1016 -
A Deep Dive into Multi-Model Databases: Hype vs. Reality Thomas Hazel Dec. 28, 2023 2334 -
The Evolution of Search: How Multi-Modal LLMs Transcend Vector Databases Thomas Hazel Oct. 14, 2023 1348 -
How to Quickly Analyze CloudFront Cloud Logs in Amazon S3 David Bunting Jul. 11, 2024 1264 -
Are Elasticsearch or OpenSearch Serverless Architectures Effective? David Bunting Jun. 22, 2023 1470 -
Data Retention Policy Guide Dave Armlin Aug. 10, 2023 2825 -
CloudWatch Logs to S3: The Easy Way David Bunting May. 25, 2023 1120 -
6 Gaming Analytics Challenges and How To Solve Them David Bunting Jan. 25, 2024 1561 -
How to discover advanced persistent threats in AWS David Bunting Jan. 19, 2023 1104 -
5 Guiding Principles of Digital Business Observability David Bunting Jan. 11, 2024 1661 -
Leveraging Amazon S3 Cloud Object Storage for Analytics Thomas Hazel Dec. 08, 2023 1866 -
What is an Internal Developer Platform (IDP) and Why It Matters David Bunting May. 18, 2023 1347 -
Unpacking the Differences between AWS Redshift and AWS Athena Dave Armlin Mar. 14, 2024 1514 -
The Best Way to Index and Query JSON Logs David Bunting Oct. 06, 2023 3095 -
10 DevOps Tools for Continuous Monitoring Dave Armlin Apr. 21, 2023 2195 -
Log and Event Analytics on Databricks: Overview and Use Cases David Bunting May. 30, 2024 1765 -
How to Threat Hunt in Amazon Security Lake David Bunting Apr. 04, 2024 999 -
4 Challenges of Serverless Log Management in AWS David Bunting Mar. 09, 2023 1302 -
How to Reduce Continuous Monitoring Costs David Bunting Sep. 29, 2023 1011 -
Databricks Data Lakehouse Versus a Data Warehouse: What’s the Difference? David Bunting Sep. 12, 2024 1413 -
Cloud Object Storage-based Architectures are Natively Scalable and Available Thomas Hazel Jan. 05, 2023 2302 -
What is a Real-Time Data Lake? David Bunting Aug. 24, 2023 1348 -
How to Create an S3 Bucket with AWS CLI David Bunting May. 09, 2024 2095 -
What is Platform Engineering and Why Does It Matter? David Bunting Mar. 30, 2023 1499 -
6 Reasons Your Data Lake Isn’t Working Out David Bunting Nov. 09, 2023 1310 -
A Simplified Guide to Kubernetes Monitoring David Bunting Nov. 23, 2023 2363 -
5 Advanced DevSecOps Techniques to Try in 2023 David Bunting Feb. 02, 2023 1586 -
An Overview of Streaming Analytics in AWS for Logging Applications David Bunting Feb. 09, 2023 1662 -
Threat Hunting Frameworks and Methodologies: An Introductory Guide Thomas Hazel Feb. 08, 2024 1603 -
8 Challenges of Microservices and Serverless Log Management David Bunting Jul. 20, 2023 2019 -
Amazon Security Lake & ChaosSearch deliver security analytics with industry-leading cost & unlimited retention Sandro Lima May. 30, 2023 895 -
OpenSearch vs. Elasticsearch: Which is Better? David Bunting Oct. 26, 2023 1463 -
Data lake vs. data mesh: Which one is right for you? Thomas Hazel Mar. 23, 2023 1439 -
Inside DataOps: 3 Ways DevOps Analytics Can Create Better Products Dave Armlin Feb. 29, 2024 1365 -
5 AWS Logging Tips and Best Practices Sandro Lima Sep. 21, 2023 1941 -
How to Create a Dashboard in Kibana Sandro Lima Feb. 17, 2023 2245 -
Improving Patch and Vulnerability Management with Proactive Security Analysis David Bunting Jul. 01, 2024 1635 -
How to Search Your Cloud Data — With No Data Movement David Bunting Mar. 28, 2024 1226 -
How to use GenAI for database query optimization and natural language analysis David Bunting Feb. 16, 2024 1144 -
SIEM Logging for Enterprise Security Operations and Threat Hunting Dave Armlin Oct. 19, 2023 2007 -
Databases Compared: Databricks vs. Snowflake vs. ChaosSearch vs. Elasticsearch David Bunting May. 16, 2024 1992 -
5 Challenges Querying Data in Databricks + How to Overcome Them David Bunting Sep. 19, 2024 1569 -
3 Ways FinTechs Can Improve Cloud Observability at Scale David Bunting Sep. 15, 2023 1360 -
What is the Future of Apache Spark in Big Data Analytics? David Bunting Jul. 04, 2024 1866 -
How To Use the MITRE ATT&CK Framework Thomas Hazel May. 24, 2024 2284 -
Ultimate Guide to Amazon S3 Data Lake Observability for Security Teams Dave Armlin Aug. 15, 2024 1731 -
How to Unlock Faster Analytics with Amazon S3 Express One Zone David Bunting Jan. 18, 2024 1134 -
How to Use Operational IT Data for PLG David Bunting Mar. 02, 2023 922 -
5 Best Practices for Streaming Analytics with S3 in the AWS Cloud David Bunting Feb. 22, 2024 1624 -
Buyer Beware! Three Challenges with Elasticsearch and OpenSearch David Bunting Nov. 02, 2023 1539 -
Data-Led Growth: How FinTechs Win with App Event Analytics David Bunting Jun. 29, 2023 2608 -
5 Security Logging and Monitoring Mistakes to Avoid David Bunting Jun. 13, 2024 1241 -
5 Multi-cloud Data Management Best Practices You Should Follow David Bunting Dec. 14, 2023 1505 -
Why Log Analytics is Key to Unlocking the Value of XDR for Enterprises David Bunting Apr. 06, 2023 1563 -
3 Ways to Break Down SaaS Data Silos David Bunting May. 11, 2023 1082 -
Can You Use the ELK Stack as a SIEM? A Fresh Take David Bunting Oct. 12, 2023 1226 -
5 Proactive Security Engineering Techniques for Cloud-Native Teams David Bunting Mar. 07, 2024 1458 -
The Power of Combining a Modular Security Data Lake with an XDR David Bunting Aug. 02, 2024 1682 -
Inside the Modern Data Analytics Stack Dave Armlin Apr. 25, 2024 1343 -
From Silos to Collaboration: How to Democratize Data in Product Analytics David Bunting May. 04, 2023 1680 -
Best Practices for Effective Log Management David Bunting Dec. 21, 2023 1648 -
10 AWS Data Lake Best Practices Dave Armlin Jun. 01, 2023 2388 -
How to Use Log Analytics for Insider Threat Detection David Bunting Oct. 03, 2024 1990 -
How to Detect Threats to AI Systems with MITRE ATLAS Framework David Bunting Oct. 17, 2024 3074 -
Why Monitoring Matters to ML Data Intelligence in Databricks David Bunting Oct. 24, 2024 1396 -
Crushing False Positives: Supercharging SOC Efficiency with Smarter Threat Intel David Bunting Nov. 14, 2024 1287 -

By Matt Makai. 2021-2024.