Wie man aus langweiligen Logdateien Gold gewinnen kann

Size: px
Start display at page:

Download "Wie man aus langweiligen Logdateien Gold gewinnen kann"

Transcription

1 1 Wie man aus langweiligen Logdateien Gold gewinnen kann

2 About me 2 Klaus Bild Senior System Architect IBM Connections/Sametime/TDI Monitoring/Log Management Infrastructure (Cloud, Docker ) Blog:

3 Logdatei 3 Eine Logdatei (auch Ereignisprotokolldatei; englisch log file) enthält das automatisch geführte Protokoll aller oder bestimmter Aktionen von Prozessen auf einem Computersystem. Die korrekte Bezeichnung dafür ist deshalb Protokolldatei. Wichtige Anwendungen finden sich vor allem bei der Prozesskontrolle und Automatisierung. Prinzipiell werden alle Aktionen mitgeschrieben, die für eine spätere Untersuchung (Audit) erforderlich sind oder sein könnten. Der Flugschreiber in Flugzeugen ist ein Beispiel für kontinuierliche Protokollierung, die jedoch selten ausgewertet wird, zum Beispiel nach einem Unfall. Im Bereich der Datenbanken bezeichnet Logfile die Protokolldatei, in der Änderungen an der Datenbank von korrekt abgeschlossenen Transaktionen (per Commit abgeschlossen) festgehalten werden, um im Fall eines Fehlers (z. B. Systemabsturz) den aktuellen Datenbestand wiederherstellen zu können.

4 When do you consult logs? 4 Never: You are not an admin or developer If something went wrong (and a user reported it): What happened? Where? When? Why?

5 But 5 Multi-tier systems: Multiple servers Multiple applications Multiple databases Multiple systems

6 Log Sources 6 Infrastructure Servers Containers Web servers Load balancers Paas / IaaS Databases Queries Errors Appliances Routers Switches Firewalls Sensors IoT Industrie 4.0 Home automation Tools Configuration Automation Analytics tools Alerting tools Chat tools Front End Log-ins Form completions Important click events Applications / APIs Requests Error handling Successes Failed attempts Privilege changes Object manipulation

7 Log examples: Logs [01988: ] :49:35 Opened session for WGMob01/WGC/CH (Release 9.0.1FP4) [ ] [INT_2_VYATTA-default-D]IN=bond1 OUT=bond MAC=00:00:5e:00:01:01:00:08:e3:ff:fd:90:08:00 SRC= DST= LEN=106 TOS=0x00 PREC=0x00 TTL=55 ID=27102 PROTO=ICMP TYPE=3 CODE=3 [SRC= DST= LEN=78 TOS=0x08 PREC=0x20 TTL=235 ID=62876 DF PROTO=UDP SPT=15798 DPT=53 LEN=58 ] [18/Jan/2016:01:54: ] "POST /savenewsubmit.do HTTP/1.1" " "Mozilla/5.0 (Windows NT 6.1; Trident/7.0; MATP; rv:11.0) like Gecko [1/18/16 8:46:05:061 CET] b6 IndexBuilderQ I com.ibm.connections.search.admin.index.impl.indexbuilderqueue build CLFRW0285I: Search is starting to build the index for wikis. 7

8 Visualization of Logs = Gold 8

9 Visualization of Logs 9 Gives you: Operational Visibility Gain end-to-end visibility across your operations and break down silos across your infrastructure Search and Investigation Find and fix problems, correlate events across multiple data sources and automatically detect patterns across massive sets of data Proactive Monitoring Monitor systems in real time to identify issues, problems and attacks before they impact your customers, services and revenues Business Insights Make better-informed business decisions by understanding trends, patterns and gaining operational intelligence from machine data

10 Visualization of Logs 10 The Solution - ELK Stack

11 The ELK stack 11 Elastic Search: Lucene based search engine (Java Stack) Distributed capability REST API over HTTP Data share using JSON fromat Logstash: Ruby Agent application Agent to collect log data in numerous input formats Filters can be applied Many Output formats supported Kibana: Flexible analytics and visualization platform

12 WebGate environment 12 Agents/Shipper Broker Filter/Indexer Filebeat Web Interface/Visualizer Search/Storage Docker containers

13 Logstash 13 Input: beats, couchdb_changes, drupal_dblog, elasticsearch, exec, eventlog, file, ganglia, gelf, generator, graphite, github, heartbeat, heroku, http, http_poller, irc, imap, jdbc, jmx, kafka, log4j, lumberjack, meetup, pipe, puppet_facter, relp, rss, rackspace, rabbitmq, redis, snmptrap, stdin, sqlite, s3, sqs, stomp, syslog, tcp, twitter, unix, udp, varnishlog, wmi, websocket, xmpp, zenoss, zeromq Output: boundary, circonus, csv, cloudwatch, datadog, datadog_metrics, , elasticsearch, elasticsearch_java, exec, file, google_bigquery, google_cloud_storage, ganglia, gelf, graphtastic, graphite, hipchat, http, irc, influxdb, juggernaut, jira, kafka, lumberjack, librato, loggly, mongodb, metriccatcher, nagios, null, nagios_nsca, opentsdb, pagerduty, pipe, riemann, redmine, rackspace, rabbitmq, redis, riak, s3, sqs, stomp, statsd, solr_http, sns, syslog, stdout, tcp, udp, webhdfs, websocket, xmpp, zabbix, zeromq

14 Logstash 14 Filter: aggregate, alter, anonymize, collate, csv, cidr, clone, cipher, checksum, date, de_dot, dns, drop, elasticsearch, extractnumbers, environment, elapsed, fingerprint, geoip, grok, i18n, json, json_encode, kv, mutate, metrics, multiline, metaevent, prune, punct, ruby, range, syslog_pri, sleep, split, throttle, translate, uuid, urldecode, useragent, xml, zeromq [15/Mar/2016:08:41: ] "GET /files/basic/api/myfilesync/feed?page=1&pagesize=500&includeconflict=true HTTP/1.1" "-" "IBM-LC-IBM Connections sync/ (Mac OS X )" Log Entry/Message Filters Field 1 i.e. Source IP Field 2 Field 3 Field 4 Field 5 Document

15 Logstash 15 Example (HTTP access log): [15/Mar/2016:08:41: ] "GET /files/basic/api/myfilesync/feed?page=1&pagesize=500&includeconflict=true HTTP/1.1" "-" "IBM-LC-IBM Connections sync/ (Mac OS X )" filter { if [type] == "apache_access" { grok { match => { "message" => "%{IPORHOST:clientip} %{USER:ident} %{USER:auth} \[%{HTTPDATE:timestamp}\] "(?:%{WORD:verb} %{NOTSPACE:request}(?: HTTP/%{NUMBER:httpversion})? %{DATA:rawrequest})" %{NUMBER:response} (?:%{NUMBER:bytes} -) %{QS:referrer} %{QS:agent} } clientip : timestamp: 15/Mar/2016:08:41: verb: GET request: /files/basic/api/myfilesync/feed?page=1&pagesize=5 00&includeConflict=true httpversion: 1.1 response: 200 bytes: 1323 referrer: - agent: "IBM-LC-IBM Connections sync/ (Mac OS X )"

16 Logstash 16 Example (HTTP access log): [15/Mar/2016:08:41: ] "GET /files/basic/api/myfilesync/feed?page=1&pagesize=500&includeconflict=true HTTP/1.1" "-" "IBM-LC-IBM Connections sync/ (Mac OS X )" date { match => [ "timestamp", "dd/mmm/yyyy:hh:mm:ss Z" ] } geoip { source => "clientip" target => "geoip" database => "/etc/logstash/geolitecity.dat" add_field => [ "[geoip][coordinates]", "%{[geoip][longitude]}" ] add_field => [ "[geoip][coordinates]", "%{[geoip][latitude]}" ] } useragent { source => "agent" add_tag => [ "browser" ] } } } os_name : Mac OS X timestamp: 15/Mar/2016:08:41: agent: "IBM-LC-IBM Connections sync/ (Mac OS X )" os_major : 10 clientip : geoip.country_code3: CHE os_minor : 10 geoip.location: , name : Other

17 Logstash 17

18 Visualization of Logs 18 Gives you: Operational Visibility Gain end-to-end visibility across your operations and break down silos across your infrastructure Search and Investigation Find and fix problems, correlate events across multiple data sources and automatically detect patterns across massive sets of data Proactive Monitoring Monitor systems in real time to identify issues, problems and attacks before they impact your customers, services and revenues Business Insights Make better-informed business decisions by understanding trends, patterns and gaining operational intelligence from machine data IBM Solutions Log Management Centralized Log Management Security Monitoring Performance Monitoring Data Analysis

19 19 Costs All ELK Stack products are Installation and configuration: Couple of days

Using elasticsearch, logstash and kibana to create realtime dashboards

Using elasticsearch, logstash and kibana to create realtime dashboards Using elasticsearch, logstash and kibana to create realtime dashboards Alexander Reelsen @spinscale alexander.reelsen@elasticsearch.com Agenda The need, complexity and pain of logging Logstash basics Usage

More information

Finding the needle in the haystack with ELK

Finding the needle in the haystack with ELK Finding the needle in the haystack with ELK Elasticsearch for Incident Handlers and Forensic Analysts S by Christophe@Vandeplas.com Whoami S Working for the Belgian Government my own company S Incident

More information

Mobile Analytics. mit Elasticsearch und Kibana. Dominik Helleberg

Mobile Analytics. mit Elasticsearch und Kibana. Dominik Helleberg Mobile Analytics mit Elasticsearch und Kibana Dominik Helleberg Speaker Dominik Helleberg Mobile Development Android / Embedded Tools http://dominik-helleberg.de/+ Mobile Analytics Warum? Server Software

More information

LOG- UND EVENTMANAGEMENT

LOG- UND EVENTMANAGEMENT LOG- UND EVENTMANAGEMENT OSMC 2013 23.10.2013 BERND ERK NETWAYS GMBH AGENDA Kurzvorstellung Einführung Architektur Installation Routing und Filterung von Events Interfaces & API Integration in Nagios und

More information

Logging on a Shoestring Budget

Logging on a Shoestring Budget UNIVERSITY OF NEBRASKA AT OMAHA Logging on a Shoestring Budget James Harr jharr@unomaha.edu Agenda The Tools ElasticSearch Logstash Kibana redis Composing a Log System Q&A, Conclusions, Lessons Learned

More information

LOG- UND EVENTMANAGEMENT MIT LOGSTASH UND GRAPHITE

LOG- UND EVENTMANAGEMENT MIT LOGSTASH UND GRAPHITE LOG- UND EVENTMANAGEMENT MIT LOGSTASH UND GRAPHITE LINUXTAG 2014 08.05.2014 BERND ERK NETWAYS GMBH AGENDA Kurzvorstellung Einführung Architektur Installation Routing und Filterung von Events Interfaces

More information

Log management with Graylog2 Lennart Koopmann, FrOSCon 2012. Mittwoch, 29. August 12

Log management with Graylog2 Lennart Koopmann, FrOSCon 2012. Mittwoch, 29. August 12 Log management with Graylog2 Lennart Koopmann, FrOSCon 2012 About me 24 years old, Software Engineer at XING AG Hamburg, Germany @_lennart Graylog2 Free and open source log management system Started in

More information

Log management with Logstash and Elasticsearch. Matteo Dessalvi

Log management with Logstash and Elasticsearch. Matteo Dessalvi Log management with Logstash and Elasticsearch Matteo Dessalvi HEPiX 2013 Outline Centralized logging. Logstash: what you can do with it. Logstash + Redis + Elasticsearch. Grok filtering. Elasticsearch

More information

Powering Monitoring Analytics with ELK stack

Powering Monitoring Analytics with ELK stack Powering Monitoring Analytics with ELK stack Abdelkader Lahmadi, Frédéric Beck INRIA Nancy Grand Est, University of Lorraine, France 2015 (compiled on: June 23, 2015) References online Tutorials Elasticsearch

More information

Using Logstash and Elasticsearch analytics capabilities as a BI tool

Using Logstash and Elasticsearch analytics capabilities as a BI tool Using Logstash and Elasticsearch analytics capabilities as a BI tool Pashalis Korosoglou, Pavlos Daoglou, Stefanos Laskaridis, Dimitris Daskopoulos Aristotle University of Thessaloniki, IT Center Outline

More information

Analyzing large flow data sets using. visualization tools. modern open-source data search and. FloCon 2014. Max Putas

Analyzing large flow data sets using. visualization tools. modern open-source data search and. FloCon 2014. Max Putas Analyzing large flow data sets using modern open-source data search and visualization tools FloCon 2014 Max Putas About me Operations Engineer - DevOps BS, MS, and CAS in Telecommunications Work/research

More information

Real-time Data Analytics mit Elasticsearch. Bernhard Pflugfelder inovex GmbH

Real-time Data Analytics mit Elasticsearch. Bernhard Pflugfelder inovex GmbH Real-time Data Analytics mit Elasticsearch Bernhard Pflugfelder inovex GmbH Bernhard Pflugfelder Big Data Engineer @ inovex Fields of interest: search analytics big data bi Working with: Lucene Solr Elasticsearch

More information

Log infrastructure & Zabbix. logging tools integration

Log infrastructure & Zabbix. logging tools integration Log infrastructure & Zabbix logging tools integration About me Me Linux System Architect @ ICTRA from Belgium (...) IT : Linux & SysAdmin work, Security, ICTRA ICT for Rail for Transport Mobility Security

More information

Andrew Moore Amsterdam 2015

Andrew Moore Amsterdam 2015 Andrew Moore Amsterdam 2015 Agenda Why log How to log Audit plugins Log analysis Demos Logs [timestamp]: [some useful data] Why log? Error Log Binary Log Slow Log General Log Why log? Why log? Why log?

More information

Reliable log data transfer

Reliable log data transfer OWASP Switzerland Chapter December 2015 Reliable log data transfer About (r)syslog, logstash, and log data signing A field report pascal.buchbinder@adnovum.ch Agenda Why we need log data transfer Syslog

More information

Using NXLog with Elasticsearch and Kibana. Using NXLog with Elasticsearch and Kibana

Using NXLog with Elasticsearch and Kibana. Using NXLog with Elasticsearch and Kibana Using NXLog with Elasticsearch and Kibana i Using NXLog with Elasticsearch and Kibana Using NXLog with Elasticsearch and Kibana ii Contents 1 Setting up Elasticsearch and Kibana 1 1.1 Installing Elasticsearch................................................

More information

A New Approach to Network Visibility at UBC. Presented by the Network Management Centre and Wireless Infrastructure Teams

A New Approach to Network Visibility at UBC. Presented by the Network Management Centre and Wireless Infrastructure Teams A New Approach to Network Visibility at UBC Presented by the Network Management Centre and Wireless Infrastructure Teams Agenda Business Drivers Technical Overview Network Packet Broker Tool Network Monitoring

More information

Developing an Application Tracing Utility for Mule ESB Application on EL (Elastic Search, Log stash) Stack Using AOP

Developing an Application Tracing Utility for Mule ESB Application on EL (Elastic Search, Log stash) Stack Using AOP Developing an Application Tracing Utility for Mule ESB Application on EL (Elastic Search, Log stash) Stack Using AOP Mohan Bandaru, Amarendra Kothalanka, Vikram Uppala Student, Department of Computer Science

More information

Innominate mguard Version 6

Innominate mguard Version 6 Innominate mguard Version 6 Application Note: Firewall Logging mguard smart mguard PCI mguard blade mguard industrial RS EAGLE mguard mguard delta Innominate Security Technologies AG Albert-Einstein-Str.

More information

Processing millions of logs with Logstash

Processing millions of logs with Logstash and integrating with Elasticsearch, Hadoop and Cassandra November 21, 2014 About me My name is Valentin Fischer-Mitoiu and I work for the University of Vienna. More specificaly in a group called Domainis

More information

Monitoring Linux and Windows Logs with Graylog Collector. Bernd Ahlers Graylog, Inc.

Monitoring Linux and Windows Logs with Graylog Collector. Bernd Ahlers Graylog, Inc. Monitoring Linux and Windows Logs with Graylog Collector Bernd Ahlers Graylog, Inc. Structured Logging & Introduction to Graylog Collector Bernd Ahlers Graylog, Inc. Introduction: Graylog Open source log

More information

Data Discovery and Systems Diagnostics with the ELK stack. Rittman Mead - BI Forum 2015, Brighton. Robin Moffatt, Principal Consultant Rittman Mead

Data Discovery and Systems Diagnostics with the ELK stack. Rittman Mead - BI Forum 2015, Brighton. Robin Moffatt, Principal Consultant Rittman Mead Data Discovery and Systems Diagnostics with the ELK stack Rittman Mead - BI Forum 2015, Brighton Robin Moffatt, Principal Consultant Rittman Mead T : +44 (0) 1273 911 268 (UK) About Me Principal Consultant

More information

Introduction. Background

Introduction. Background Introduction Bro is an open-source network security monitor which inspects network traffic looking for suspicious activity. The Bro framework provides an extensible scripting language that allows an analysis

More information

Blackboard Open Source Monitoring

Blackboard Open Source Monitoring Blackboard Open Source Monitoring By Greg Lloyd Submitted to the Faculty of the School of Information Technology in Partial Fulfillment of the Requirements for the Degree of Bachelor of Science in Information

More information

How To Use Elasticsearch

How To Use Elasticsearch Elasticsearch, Logstash, and Kibana (ELK) Dwight Beaver dsbeaver@cert.org Sean Hutchison shutchison@cert.org January 2015 2014 Carnegie Mellon University This material is based upon work funded and supported

More information

Why should you look at your logs? Why ELK (Elasticsearch, Logstash, and Kibana)?

Why should you look at your logs? Why ELK (Elasticsearch, Logstash, and Kibana)? Authors Introduction This guide is designed to help developers, DevOps engineers, and operations teams that run and manage applications on top of AWS to effectively analyze their log data to get visibility

More information

IAC-BOX Network Integration. IAC-BOX Network Integration IACBOX.COM. Version 2.0.1 English 24.07.2014

IAC-BOX Network Integration. IAC-BOX Network Integration IACBOX.COM. Version 2.0.1 English 24.07.2014 IAC-BOX Network Integration Version 2.0.1 English 24.07.2014 In this HOWTO the basic network infrastructure of the IAC-BOX is described. IAC-BOX Network Integration TITLE Contents Contents... 1 1. Hints...

More information

Log Analysis with the ELK Stack (Elasticsearch, Logstash and Kibana) Gary Smith, Pacific Northwest National Laboratory

Log Analysis with the ELK Stack (Elasticsearch, Logstash and Kibana) Gary Smith, Pacific Northwest National Laboratory Log Analysis with the ELK Stack (Elasticsearch, Logstash and Kibana) Gary Smith, Pacific Northwest National Laboratory A Little Context! The Five Golden Principles of Security! Know your system! Principle

More information

Logentries Insights: The State of Log Management & Analytics for AWS

Logentries Insights: The State of Log Management & Analytics for AWS Logentries Insights: The State of Log Management & Analytics for AWS Trevor Parsons Ph.D Co-founder & Chief Scientist Logentries 1 1. Introduction The Log Management industry was traditionally driven by

More information

Bernd Ahlers Michael Friedrich. Log Monitoring Simplified Get the best out of Graylog2 & Icinga 2

Bernd Ahlers Michael Friedrich. Log Monitoring Simplified Get the best out of Graylog2 & Icinga 2 Bernd Ahlers Michael Friedrich Log Monitoring Simplified Get the best out of Graylog2 & Icinga 2 BEFORE WE START Agenda AGENDA Introduction Tools Log History Logs & Monitoring Demo The Future Resources

More information

CI Pipeline with Docker 2015-02-27

CI Pipeline with Docker 2015-02-27 CI Pipeline with Docker 2015-02-27 Juho Mäkinen, Technical Operations, Unity Technologies Finland http://www.juhonkoti.net http://github.com/garo Overview 1. Scale on how we use Docker 2. Overview on the

More information

Efficient Management of System Logs using a Cloud Radoslav Bodó, Daniel Kouřil CESNET. ISGC 2013, March 2013

Efficient Management of System Logs using a Cloud Radoslav Bodó, Daniel Kouřil CESNET. ISGC 2013, March 2013 Efficient Management of System Logs using a Cloud Radoslav Bodó, Daniel Kouřil CESNET ISGC 2013, March 2013 Agenda Introduction Collecting logs Log Processing Advanced analysis Resume Introduction Status

More information

About Me. Triona Workshop Mainz, September 2014. Thomas Wehrspann. Consultant. Wilhelm-Theodor-Römheld-Str. 14 55130 Mainz. thomas.wehrspann@triona.

About Me. Triona Workshop Mainz, September 2014. Thomas Wehrspann. Consultant. Wilhelm-Theodor-Römheld-Str. 14 55130 Mainz. thomas.wehrspann@triona. About Me Triona Workshop Mainz, September 2014 Thomas Wehrspann Consultant Wilhelm-Theodor-Römheld-Str. 14 55130 Mainz thomas.wehrspann@triona.de Agenda Rückblick Akzeptanztests Monitoring Rückblick Developer

More information

Log Management with Open-Source Tools. Risto Vaarandi SEB Estonia

Log Management with Open-Source Tools. Risto Vaarandi SEB Estonia Log Management with Open-Source Tools Risto Vaarandi SEB Estonia Outline Why use open source tools for log management? Widely used logging protocols and recently introduced new standards Open-source syslog

More information

Network Traffic Evolution. Prof. Anja Feldmann, Ph.D. Dr. Steve Uhlig

Network Traffic Evolution. Prof. Anja Feldmann, Ph.D. Dr. Steve Uhlig Network Traffic Evolution Prof. Anja Feldmann, Ph.D. Dr. Steve Uhlig 1 Example trace Name port % bytes % packets bytes per packet world-wide-web 80???????????? netnews 119???????????? pop-3 mail 110????????????...

More information

ArcGIS GeoEvent Extension for Server: Working with Community Connectors and Processors

ArcGIS GeoEvent Extension for Server: Working with Community Connectors and Processors ArcGIS GeoEvent Extension for Server: Working with Community Connectors and Processors Greg Tieman gtieman@esri.com Patrick Hill patrick_hill@esri.com Real-Time GIS Integration and exploitation of streaming

More information

Repsheet. A Behavior Based Approach to Web Application Security. Aaron Bedra Application Security Lead Braintree Payments. tirsdag den 1.

Repsheet. A Behavior Based Approach to Web Application Security. Aaron Bedra Application Security Lead Braintree Payments. tirsdag den 1. Repsheet A Behavior Based Approach to Web Application Security Aaron Bedra Application Security Lead Braintree Payments Right now, your web applications are being attacked And it will happen again, and

More information

Log managing at PIC. A. Bruno Rodríguez Rodríguez. Port d informació científica Campus UAB, Bellaterra Barcelona. December 3, 2013

Log managing at PIC. A. Bruno Rodríguez Rodríguez. Port d informació científica Campus UAB, Bellaterra Barcelona. December 3, 2013 Log managing at PIC A. Bruno Rodríguez Rodríguez Port d informació científica Campus UAB, Bellaterra Barcelona December 3, 2013 Bruno Rodríguez (PIC) Log managing at PIC December 3, 2013 1 / 21 What will

More information

Modern Web development and operations practices. Grig Gheorghiu VP Tech Operations Nasty Gal Inc. @griggheo

Modern Web development and operations practices. Grig Gheorghiu VP Tech Operations Nasty Gal Inc. @griggheo Modern Web development and operations practices Grig Gheorghiu VP Tech Operations Nasty Gal Inc. @griggheo Modern Web stack Aim for horizontal scalability! Ruby/Python front-end servers (Sinatra/Padrino,

More information

Cisco ASA und FirePOWER Services

Cisco ASA und FirePOWER Services Cisco ASA und FirePOWER Services 1 Die Abwehr von Bedrohungen ist ein Prozess Attack Continuum BEFORE Control Enforce Harden DURING Detect Block Defend AFTER Scope Contain Remediate Firewall/VPN Applikations-Kontrolle

More information

Log management with Graylog2 Lennart Koopmann, Kieker Days 2012. Mittwoch, 5. Dezember 12

Log management with Graylog2 Lennart Koopmann, Kieker Days 2012. Mittwoch, 5. Dezember 12 Log management with Graylog2 Lennart Koopmann, Kieker Days 2012 About me 24 years old, Software Engineer at XING AG Hamburg, Germany @_lennart Graylog2 Free and open source log management system Started

More information

Network Security Management

Network Security Management Network Security Management TWNIC 2003 Objective Have an overview concept on network security management. Learn how to use NIDS and firewall technologies to secure our networks. 1 Outline Network Security

More information

Microsoft Azure. Die "Hyper-Scale" Cloudplattform. Gerwald Oberleitner 22. September 2015

Microsoft Azure. Die Hyper-Scale Cloudplattform. Gerwald Oberleitner 22. September 2015 Microsoft Azure Die "Hyper-Scale" Cloudplattform Gerwald Oberleitner 22. September 2015 Wie sich Microsoft Hyper-scale Azure differenziert Enterprise Grade Hybrid Azure footprint Azure footprint Datacenter

More information

Barracuda Networks Web Application Firewall

Barracuda Networks Web Application Firewall McAfee Enterprise Security Manager Data Source Configuration Guide Data Source: Barracuda Networks Web Application Firewall January 30, 2015 Barracuda Networks Web Application Firewall Page 1 of 10 Important

More information

Chapter 11 Cloud Application Development

Chapter 11 Cloud Application Development Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How

More information

Let s talk about assets in QRadar

Let s talk about assets in QRadar QRadar Open Mic Webcast #7 January 28, 2015 Let s talk about assets in QRadar Panelists Dwight Spencer Principal Solutions Architect & Co-founder of Q1 Labs Adam Frank Principal Solutions Architect Brad

More information

XpoLog Center Suite Log Management & Analysis platform

XpoLog Center Suite Log Management & Analysis platform XpoLog Center Suite Log Management & Analysis platform Summary: 1. End to End data management collects and indexes data in any format from any machine / device in the environment. 2. Logs Monitoring -

More information

SPECTRUM IM. SSA 3.0: Service AND Event/Alert Umbrella DACHSUG 2011

SPECTRUM IM. SSA 3.0: Service AND Event/Alert Umbrella DACHSUG 2011 SPECTRUM IM Infrastructure Events and Alerts Overview Event Management and Correlation Event Rules Condition Correlation Event Procedures Event Integration South-Bound-GW Event Notifications SSA 3.0: Service

More information

CloudStack Metering Working with the Usage Data. Tariq Iqbal Senior Consultant tariq.iqbal@shapeblue.com Twitter: @TariqIqbal_ @ShapeBlue

CloudStack Metering Working with the Usage Data. Tariq Iqbal Senior Consultant tariq.iqbal@shapeblue.com Twitter: @TariqIqbal_ @ShapeBlue CloudStack Metering Working with the Usage Data Tariq Iqbal Senior Consultant tariq.iqbal@shapeblue.com Twitter: @TariqIqbal_ @ShapeBlue About Me Involved with CloudStack before donation to Apache Built

More information

Information Retrieval Elasticsearch

Information Retrieval Elasticsearch Information Retrieval Elasticsearch IR Information retrieval (IR) is the activity of obtaining information resources relevant to an information need from a collection of information resources. Searches

More information

Graylog2 Lennart Koopmann, OSDC 2014. @_lennart / www.graylog2.org

Graylog2 Lennart Koopmann, OSDC 2014. @_lennart / www.graylog2.org Graylog2 Lennart Koopmann, OSDC 2014 @_lennart / www.graylog2.org About me 25 years old Living in Hamburg, Germany @_lennart on Twitter Co-Founder of TORCH - The Graylog2 company. Graylog2 history Started

More information

Search Engines Chapter 2 Architecture. 14.4.2011 Felix Naumann

Search Engines Chapter 2 Architecture. 14.4.2011 Felix Naumann Search Engines Chapter 2 Architecture 14.4.2011 Felix Naumann Overview 2 Basic Building Blocks Indexing Text Acquisition Text Transformation Index Creation Querying User Interaction Ranking Evaluation

More information

Comparative Analysis of Open-Source Log Management Solutions for Security Monitoring and Network Forensics

Comparative Analysis of Open-Source Log Management Solutions for Security Monitoring and Network Forensics Comparative Analysis of Open-Source Log Management Solutions for Security Monitoring and Network Forensics Risto Vaarandi, Paweł Niziski NATO Cooperative Cyber Defence Centre of Excellence, Tallinn, Estonia

More information

ExtraHop and AppDynamics Deployment Guide

ExtraHop and AppDynamics Deployment Guide ExtraHop and AppDynamics Deployment Guide This guide describes how to use ExtraHop and AppDynamics to provide real-time, per-user transaction tracing across the entire application delivery chain. ExtraHop

More information

quick documentation Die Parameter der Installation sind in diesem Artikel zu finden:

quick documentation Die Parameter der Installation sind in diesem Artikel zu finden: quick documentation TO: FROM: SUBJECT: ARND.SPIERING@AS-INFORMATIK.NET ASTARO FIREWALL SCAN MIT NESSUS AUS BACKTRACK 5 R1 DATE: 24.11.2011 Inhalt Dieses Dokument beschreibt einen Nessus Scan einer Astaro

More information

WHITE PAPER Redefining Monitoring for Today s Modern IT Infrastructures

WHITE PAPER Redefining Monitoring for Today s Modern IT Infrastructures WHITE PAPER Redefining Monitoring for Today s Modern IT Infrastructures Modern technologies in Zenoss Service Dynamics v5 enable IT organizations to scale out monitoring and scale back costs, avoid service

More information

Secret Server Splunk Integration Guide

Secret Server Splunk Integration Guide Secret Server Splunk Integration Guide Table of Contents Meeting Information Security Compliance Mandates: Secret Server and Splunk SIEM Integration and Configuration... 1 The Secret Server Approach to

More information

Maintaining Non-Stop Services with Multi Layer Monitoring

Maintaining Non-Stop Services with Multi Layer Monitoring Maintaining Non-Stop Services with Multi Layer Monitoring Lahav Savir System Architect and CEO of Emind Systems lahavs@emindsys.com www.emindsys.com The approach Non-stop applications can t leave on their

More information

VMware vcenter Log Insight Security Guide

VMware vcenter Log Insight Security Guide VMware vcenter Log Insight Security Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

April 8th - 10th, 2014 LUG14 LUG14. Lustre Log Analyzer. Kalpak Shah. DataDirect Networks. ddn.com. 2014 DataDirect Networks. All Rights Reserved.

April 8th - 10th, 2014 LUG14 LUG14. Lustre Log Analyzer. Kalpak Shah. DataDirect Networks. ddn.com. 2014 DataDirect Networks. All Rights Reserved. April 8th - 10th, 2014 LUG14 LUG14 Lustre Log Analyzer Kalpak Shah DataDirect Networks Lustre Log Analysis Requirements Need scripts to parse Lustre debug logs Only way to effectively use the logs for

More information

629 Meier Lane, Onalaska, WI 54650 608.797.9651 kent@fluidbyte.net www.fluidbyte.net

629 Meier Lane, Onalaska, WI 54650 608.797.9651 kent@fluidbyte.net www.fluidbyte.net 629 Meier Lane, Onalaska, WI 54650 608.797.9651 kent@fluidbyte.net www.fluidbyte.net Kent O. Safranski Summary Web and interactive application developer and project manager with over twelve years of training

More information

Symantec Backup Exec (TM) 13 Installation Log

Symantec Backup Exec (TM) 13 Installation Log v Symantec Backup Exec (TM) 13 Installation Log 05-26-2010,15:07:12 : Explorer exists. Launching UI. 05-26-2010,15:07:14 : Executing managed _Setup: 05-26-2010,15:07:14 : C:\Dokumente und orms_multilingual_dvd\be\winnt\install\be32\install\_setup.exe

More information

Performance and Health Monitoring and Analysis of Hive Scales Portal Web Application

Performance and Health Monitoring and Analysis of Hive Scales Portal Web Application Grand Valley State University ScholarWorks@GVSU Technical Library School of Computing and Information Systems 2016 Performance and Health Monitoring and Analysis of Hive Scales Portal Web Application Ronald

More information

Secret Server Qualys Integration Guide

Secret Server Qualys Integration Guide Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server

More information

Kap. 2. Transport - Schicht

Kap. 2. Transport - Schicht Kap. 2 Transport - Schicht 2-2 Transport-Schicht Transport-Schicht: bietet eine logische Kommunikation zw. Anwendungen TCP: - Verbindungsorientiert mittels 3-Way-Handshake - zuverlässiger Datentransport

More information

Log Management with Open-Source Tools. Risto Vaarandi rvaarandi 4T Y4H00 D0T C0M

Log Management with Open-Source Tools. Risto Vaarandi rvaarandi 4T Y4H00 D0T C0M Log Management with Open-Source Tools Risto Vaarandi rvaarandi 4T Y4H00 D0T C0M Outline Why do we need log collection and management? Why use open source tools? Widely used logging protocols and recently

More information

A Basic Introduction to DevOps Tools

A Basic Introduction to DevOps Tools A Basic Introduction to DevOps Tools Akshaya H L, Nisarga Jagadish S, Vidya J, Veena K Department of computer science and engineering, VTU, Belgaum, University, Abstract DevOps is a practice in which operations

More information

Cloud Elements! Marketing Hub Provisioning and Usage Guide!

Cloud Elements! Marketing Hub Provisioning and Usage Guide! Cloud Elements Marketing Hub Provisioning and Usage Guide API Version 2.0 Page 1 Introduction The Cloud Elements Marketing Hub is the first API that unifies marketing automation across the industry s leading

More information

logstash The Book Log management made easy James Turnbull

logstash The Book Log management made easy James Turnbull The logstash Book Log management made easy James Turnbull The Logstash Book James Turnbull May 6, 2016 Version: v2.3.2 (e9c3ebc) Website: The Logstash Book Contents Page Chapter 1 Shipping Events without

More information

Linux & Docker auf Azure

Linux & Docker auf Azure Linux & Docker auf Azure Linux in der Azure Cloud Web Mail Twitter Rainer Stropek software architects gmbh http://www.timecockpit.com rainer@timecockpit.com @rstropek Saves the day. Your Host Rainer Stropek

More information

Extreme Networks: A SOLUTION WHITE PAPER

Extreme Networks: A SOLUTION WHITE PAPER Extreme Networks: The Purview Solution Integration with SIEM Integrating Application Management and Business Analytics into other IT management systems A SOLUTION WHITE PAPER WHITE PAPER Introduction Purview

More information

Addressing Security for Hybrid Cloud

Addressing Security for Hybrid Cloud Addressing Security for Hybrid Cloud Sreekanth Iyer Executive IT Architect IBM Cloud (CTO Office) Email : sreek.iyer@in.ibm.com Twitter: @sreek Blog: http://ibm.co/sreek July 18, 2015 Cloud is rapidly

More information

PPS Internet-Praktikum. Prof. Bernhard Plattner Institut für Technische Informatik und Kommunikationsnetze (TIK)

PPS Internet-Praktikum. Prof. Bernhard Plattner Institut für Technische Informatik und Kommunikationsnetze (TIK) PPS Internet-Praktikum Prof. Bernhard Plattner Institut für Technische Informatik und Kommunikationsnetze (TIK) September 2011 Zielsetzung Von unserer Webpage: Das Ziel dieser PPS-Veranstaltung ist es,

More information

Themen der Praktikumsnachmittage. PPS Internet-Praktikum. Zielsetzung. Infrastruktur im ETF B5

Themen der Praktikumsnachmittage. PPS Internet-Praktikum. Zielsetzung. Infrastruktur im ETF B5 PPS Internet-Praktikum Prof. Bernhard Plattner Institut für Technische Informatik und Kommunikationsnetze (TIK) Themen der Praktikumsnachmittage Aufbau und Analyse eines kleinen Netzwerks Routing Anwendungen

More information

Federated SQL on Hadoop and Beyond: Leveraging Apache Geode to Build a Poor Man's SAP HANA. by Christian Tzolov @christzolov

Federated SQL on Hadoop and Beyond: Leveraging Apache Geode to Build a Poor Man's SAP HANA. by Christian Tzolov @christzolov Federated SQL on Hadoop and Beyond: Leveraging Apache Geode to Build a Poor Man's SAP HANA by Christian Tzolov @christzolov Whoami Christian Tzolov Technical Architect at Pivotal, BigData, Hadoop, SpringXD,

More information

Intel IT s Cloud Journey. Speaker: [speaker name], Intel IT

Intel IT s Cloud Journey. Speaker: [speaker name], Intel IT Intel IT s Cloud Journey Speaker: [speaker name], Intel IT Accelerating The Corporate IT Journey Cloud enables ubiquitous access to resources and applications, and workload flexibility Cloud IaaS Infrastructure

More information

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence

Augmented Search for Web Applications. New frontier in big log data analysis and application intelligence Augmented Search for Web Applications New frontier in big log data analysis and application intelligence Business white paper May 2015 Web applications are the most common business applications today.

More information

Perdix: A Query Language for Security Logs

Perdix: A Query Language for Security Logs Perdix: A Query Language for Security Logs Orr Bibring ob2135@columbia.edu Justin Prosco jp2415@columbia.edu Angelika Zavou az2172@columbia.edu Bing Wu bw2236@columbia.edu September 24, 2007 Abstract This

More information

Volume SYSLOG JUNCTION. User s Guide. User s Guide

Volume SYSLOG JUNCTION. User s Guide. User s Guide Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages

More information

RabbitMQ at Skills Ma-er Cloud Exchange. Cloud Messaging Use Cases

RabbitMQ at Skills Ma-er Cloud Exchange. Cloud Messaging Use Cases RabbitMQ at Skills Ma-er Cloud Exchange Cloud Messaging Use Cases April 2010 Alexis Richardson VMware Inc. Thank you! RabbitMQ is a messaging server that just works Im in yr serverz, queueing yr messagez

More information

APPLICATION PROGRAMMING INTERFACE

APPLICATION PROGRAMMING INTERFACE DATA SHEET Advanced Threat Protection INTRODUCTION Customers can use Seculert s Application Programming Interface (API) to integrate their existing security devices and applications with Seculert. With

More information

Creating Big Data Applications with Spring XD

Creating Big Data Applications with Spring XD Creating Big Data Applications with Spring XD Thomas Darimont @thomasdarimont THE FASTEST PATH TO NEW BUSINESS VALUE Journey Introduction Concepts Applications Outlook 3 Unless otherwise indicated, these

More information

MCNC Webinar Series. Syslog

MCNC Webinar Series. Syslog MCNC Webinar Series Syslog Gonz Guzman Lead Client Network Engineer gonz@mcnc.org Bradley Stevens Sr Client Network Engineer bstevens@mcnc.org Webinar Links: www.mcnc.org/cne-webinars Agenda What is syslog?

More information

Suricata 2.0, Netfilter and the PRC

Suricata 2.0, Netfilter and the PRC Suricata 2.0, Netfilter and the PRC Éric Leblond Stamus Networks April 26, 2014 Éric Leblond (Stamus Networks) Suricata 2.0, Netfilter and the PRC April 26, 2014 1 / 52 Eric Leblond a.k.a Regit French

More information

AnyWeb AG 2008 www.anyweb.ch

AnyWeb AG 2008 www.anyweb.ch HP SiteScope (End-to-End Monitoring, System Availability) Christof Madöry AnyWeb AG ITSM Practice Circle September 2008 Agenda Management Technology Agentless monitoring SiteScope in HP BTO SiteScope look

More information

Spoilt for Choice Which Integration Framework to choose? Mule ESB. Integration. www.mwea.de. Kai Wähner

Spoilt for Choice Which Integration Framework to choose? Mule ESB. Integration. www.mwea.de. Kai Wähner Spoilt for Choice Which Integration Framework to choose? Integration vs. Mule ESB vs. Main Tasks Evaluation of Technologies and Products Requirements Engineering Enterprise Architecture Management Business

More information

Amazon Web Services Primer. William Strickland COP 6938 Fall 2012 University of Central Florida

Amazon Web Services Primer. William Strickland COP 6938 Fall 2012 University of Central Florida Amazon Web Services Primer William Strickland COP 6938 Fall 2012 University of Central Florida AWS Overview Amazon Web Services (AWS) is a collection of varying remote computing provided by Amazon.com.

More information

Diese Liste wird präsentiert von. Netheweb.de

Diese Liste wird präsentiert von. Netheweb.de Diese Liste wird präsentiert von Netheweb.de Die Liste enthält 1000 Do-Follow Blogs, die zum Linkbuilding genutzt werden können, es kann sein, dass verkürzte URL s nicht korrekt weiter geleitet werden.

More information

QAS DEBUG - User und Computer

QAS DEBUG - User und Computer QAS DEBUG - User und Computer Inhalt Computer Status vastool status Benutzer Login vastool list user vastool nss getpwnam vastool user checkaccess kinit su

More information

Common Event Format Configuration Guide

Common Event Format Configuration Guide Common Event Format Configuration Guide F5 Networks BIG-IP Application Security Manager (ASM) Date: Friday, May 27, 2011 CEF Connector Configuration Guide This document is provided for informational purposes

More information

Implementing Data Models and Reports with Microsoft SQL Server

Implementing Data Models and Reports with Microsoft SQL Server Implementing Data Models and Reports with Microsoft SQL Server Dauer: 5 Tage Kursnummer: M20466 Überblick: Business Intelligence (BI) wird für Unternehmen von verschiedenen Größen aufgrund des dadurch

More information

Introduction U41241-J-Z125-1-76 1

Introduction U41241-J-Z125-1-76 1 Introduction The rapid expansion of the Internet and increasingly mobile and more powerful end devices are the driving force behind development in information and communication technology. This process

More information

Combatting Antipatterns with PaaS

Combatting Antipatterns with PaaS Combatting Antipatterns with PaaS John Wetherill November 8, 2012 Combatting Antipatterns with PaaS John Wetherill Developer / Evangelist Agenda as a Service Convergence Antipatterns PaaS Stackato Q&A

More information

Gurkensalat statt Spaghetticode. Stuttgarter Testtage 2013

Gurkensalat statt Spaghetticode. Stuttgarter Testtage 2013 Gurkensalat statt Spaghetticode Stuttgarter Testtage 2013 1.Motivation für BDD 2.Einführung in BDD 3.Cucumber für Java 4.Lessons Learned Motivation für BDD 3 Requirements 4 ... ein wenig Excel 5 dazu noch

More information

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust

More information

Ulogd2, Advanced firewall logging

Ulogd2, Advanced firewall logging Ulogd2, Advanced firewall logging INL 172 rue de Charonne 75011 Paris, France RMLL 2009, July 8, Nantes Ulogd2, Netfilter logging reloaded 1/ 38 Some words about me NuFW main developper INL co-founder

More information

The Purview Solution Integration With Splunk

The Purview Solution Integration With Splunk The Purview Solution Integration With Splunk Integrating Application Management and Business Analytics With Other IT Management Systems A SOLUTION WHITE PAPER WHITE PAPER Introduction Purview Integration

More information

Zenoss for Cisco ACI: Application-Centric Operations

Zenoss for Cisco ACI: Application-Centric Operations Zenoss for Cisco ACI: Application-Centric Operations Introduction Zenoss is a systems management software company focused on the challenges of operating and helping ensure the delivery of large-scale IT

More information

FireEye App for Splunk Enterprise

FireEye App for Splunk Enterprise FireEye App for Splunk Enterprise FireEye App for Splunk Enterprise Documentation Version 1.1 Table of Contents Welcome 3 Supported FireEye Event Formats 3 Original Build Environment 3 Possible Dashboard

More information

Upgrading Your Skills to MCSA Windows Server 2012 MOC 20417

Upgrading Your Skills to MCSA Windows Server 2012 MOC 20417 Upgrading Your Skills to MCSA Windows Server 2012 MOC 20417 In dieser Schulung lernen Sie neue Features und Funktionalitäten in Windows Server 2012 in Bezug auf das Management, die Netzwerkinfrastruktur,

More information