Let's use centralized log collection to make incident response teams happy
This is a modal window.
The media could not be loaded, either because the server or network failed or because the format is not supported.
Formal Metadata
Title |
| |
Title of Series | ||
Number of Parts | 561 | |
Author | ||
License | CC Attribution 2.0 Belgium: You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor. | |
Identifiers | 10.5446/44375 (DOI) | |
Publisher | ||
Release Date | ||
Language |
Content Metadata
Subject Area | ||
Genre | ||
Abstract |
|
00:00
Dependent and independent variablesComputer animation
00:06
WindowValue-added networkComputer animation
00:17
SoftwareMenu (computing)BlogEvent horizonServer (computing)Physical systemScalabilityDatabase normalizationStandard deviationMusical ensembleDependent and independent variablesExecution unitMessage passingInformation securityMotion blurNormed vector spaceComputer-generated imageryRootInequality (mathematics)Data structurePasswordClient (computing)InformationConditional-access moduleQuery languageFlagGraphical user interfaceSource codeComputer networkData conversionLocal ringModule (mathematics)Rule of inferenceIn-System-ProgrammierungExploit (computer security)Extension (kinesiology)Computer fileCodePlastikkarteLoginInformation securityTheory of relativityData structureRepresentation (politics)MereologyWindowRule of inferenceThread (computing)ComputerSource codeDifferent (Kate Ryan album)OvalSoftwareDependent and independent variablesSampling (statistics)MetadataComputer animation
05:05
Computer animation
Transcript: English(auto-generated)
00:18
Just make a couple of quick changes, and then he can bring the egg out as well.
00:42
There are a lot of talks about optimization, which is a resource, not a collection software.
01:09
I can get the idea itself, download it, and also create a collection. So what log and what centralized logs?
01:22
Basically, if you're already familiar with logs, you know that you're working with a lot of computer systems. For example, you're collecting logs from devices, from Windows devices, to your own device.
01:41
The other reason why we use logs is because all of us are open to this report, which is that it's very rigorous, and the two items for that is log-less restructuring, for example.
02:02
And the other issue is that alerts are not generated in a way that initiates response from security things. And that's also in relation to the structure. I read an example of the difference between structured and unstructured log.
02:22
So at the top you have an example of unstructured log usage. The first part is structured, and the part involved is unstructured. The metadata is in that standard. The issue here is that the unstructured part is not structured.
02:44
So, for example, you can't really do, for your process, say, the same. And I also added another example of an unstructured unstructured log. So if you need to list several logs, you might be looking at that type of log problem,
03:01
and the data is unstructured. And here is an example of unstructured log. We do that as well. We accept data from different sources. So nj is one of the DBs. Or on the host, three, one, three. But we add smart logs versus bars to them.
03:25
And so you learn to get the use of data at the source, and then also you put in the representation. So both are awesome. So here's an example. So I have a few examples. I've been accessing online again. And I've developed a package for the thread.
03:42
So this one is not a rule. You have the unstructured log sample there, which is unstructured. And then there's an unstructured log structure. Two new logs there as well. And then you'll eventually have to do something that's more unstructured than that.
04:01
So it's unstructured. Those are the other examples of unstructured logging. I'll show you them all.