Six tips for Linux Log Management

Source: Internet
Author: User
Article Title: six tips for Linux Log Management. Linux is a technology channel of the IT lab in China. Includes basic categories such as desktop applications, Linux system management, kernel research, embedded systems, and open source.

Appropriate log management tools can greatly reduce the burden on managing enterprise system log data. However, unless organizations put a certain amount of time and effort into this tool, the best tool will soon become a poor tool.

The layman uses the tool and is still a layman.

If you are not prepared to spend time and energy installing and managing log management tools properly, do not waste your money on the log management system. The log management system must be properly configured to correctly parse the events and logs in your network so that the reports can be of commercial and technical value. Another "stupid" error is that critical security events are missed because you do not browse and review the alarm console. Therefore, do not make mistakes that only focus on log management technology and do not focus on system usage.

 Streamline RFP (request proposal) with predefined requirements)

Creating RFP (request proposal, requirement statement) is a time-consuming process. Once defined, some requirements can be reused in the subsequent RFP. This is common when developing log management requirements, because the basic requirements of log management (such as the log file format, data written into the log file, and so on) are the same, it can be pre-defined. Another benefit of using predefined requirements is that this ensures that requirements are consistent while streamlining the RFP cycle.

 Are you sure you have the required information?

To write effective association rules, the log management system must have sufficient contextual data for analysis. For example, to determine where a specific traffic or behavior comes from, you need to know the source IP address information, which means that the log management system must first record the IP address information, in this way, the engine can parse it. For example, if you want to write a log analysis rule to alert the behavior of the target device or application, the relevant log data must first record the behavior.

  Not limited to Static Analysis

The last thing most organizations need to do is to fill in data that does not have an overall analysis model into another large table, and then use this large table for event analysis. Alarms set based on the baseline of expected or acceptable behaviors are generated by analyzing the features of a single record in a large table and by analyzing the features of a set of records. Consider the logon records of key databases.

Generally, the two logon failures are set to the baseline that triggers the alarm. However, if the password policy of the database system changes from using simple dictionary words to using more than eight non-dictionary word strings, the baseline for the number of Logon failures may increase because the user needs to adapt to the new policy. Log Management Systems with intelligent sensing capabilities should be able to adjust to monitor development trends and provide feedback to administrators. The administrator can temporarily change the alarm threshold using this trend information.

 Use log data to describe what is happening or is happening

"Logs are an excellent source of information for fault detection ". In most cases, all the information required by the user to determine the cause of the fault can be found in the log file. During the crisis, managers often have to enter the passive mode. They can only judge what is happening by intuition, speculation, and piecing together irrelevant information that cannot be further divided. Logs are records of real events. The log management system allows management personnel to write and generate reports for fault information in real time, so as to tell the response team what happened in the network.

 Beyond the scope of security itself

The log management system is an excellent security device information collection and analysis tool. It can be used not only for security awareness, but also for other purposes. For example, you can use this information to analyze the customer experience of the top ten business relationships.

Many WEB application analysis systems cannot provide fine-grained views that demonstrate real customer experience. Well-designed application system logs can record these customer experiences. The log management system can use these logs to analyze the customer experience and extend the application field of the log management system to security analysis.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.