Skip to content

Latest commit

 

History

History
104 lines (82 loc) · 2.6 KB

13-course_recap.md

File metadata and controls

104 lines (82 loc) · 2.6 KB
SPDX-FileCopyrightText SPDX-License-Identifier title author footer description keywords color class style
© 2024 Menacit AB <[email protected]>
CC-BY-SA-4.0
Logging course: Course recap
Joel Rangsmo <[email protected]>
© Course authors (CC BY-SA 4.0)
Recap of material covered in logging course
logging
siem
course
#ffffff
invert
section.center { text-align: center; } table strong { color: #d63030; } table em { color: #2ce172; }

Course recap

Let's refresh our memory

bg right:30%


Centralized logging requirements

  • Ingestion amount
  • Availability requirements
  • Use-cases and intended end-users
  • Hosting and sovereignty
  • Support/Competence needs
  • Security and access control

bg right:30%


Collection and parsing

Most solutions available utilize "push-based" collection and centralized parsing.

Index-time parsing helps query performance, but increases onboarding and storage costs*.

Search-time parsing adds a per-query cost but increases flexibility and lowers storage costs.

bg right:30%


Retention and storage tiers

Storing log data using time-based, volume-based or capacity-based retention strategies.

Optimizing cost/performance using hot, warm, cold, frozen storage tiers.

bg right:30%


Scaling our logging capabilities using selective forwarding or federated/cross-cluster querying.

bg right:30%


Many laws and compliance frameworks require us to log and monitor sensitive activity.

Some also prevents/restricts logging.

bg right:30%


Protecting log data

Some example approaches are...

  • Confidentiality: Hardening, pseudonymization
  • Integrity: Forwarding, append-only storage
  • Availability: Replication, offline backups

bg right:30%


Let's continue, shall we?

bg right:30%