logging

May 25, 2021

DEVELOPER

Avoiding Silent Automation

4 min read

See how you can work with Python's flexible logging system to create an overall monitoring system that includes the messages from your network devices, your infrastructure applications, and your automation scripts.

May 1, 2020

DEVELOPER

Mid Season Check-in with NetDevOps Live!

3 min read

NetDevOps Live! episodes in April were fantastic, looking at Ansible, GitLab, Batfish and HashiCorp. Get ready for May's amazing line-up, with shows on Postman, NetBox, and ELK!

March 20, 2020

DEVELOPER

Announcing NetDevOps Live! Season 3

3 min read

Take a look at what we've got in store for Season 3 of NetDevOps Live! — powerful tooling available that every NetDevOps engineer can use in their tool chest: Batfish, Postman, HashiCorp, Ansible Network Automation, NetBox and more!

February 28, 2018

SECURITY

The Power of Logging in Incident Response

4 min read

A deep dive into logging as an often-overlooked but powerful tool for incident detection and response “Lack of instrumentation or insufficient logging” is often a phrase used on incident response...

November 1, 2013

SECURITY

Using a “Playbook” Model to Organize Your Information Security Monitoring Strategy

7 min read

CSIRT, I have a project for you. We have a big network and we’re definitely getting hacked constantly. Your group needs to develop and implement security monitoring to get our malware and hacking problem under control.   If you’ve been a security engineer for more than a few years, no doubt you’ve received a directive […]

October 24, 2013

SECURITY

To SIEM or Not to SIEM? Part II

10 min read

The Great Correlate Debate SIEMs have been pitched in the past as "correlation engines" and their special algorithms can take in volumes of logs and filter everything down to just...

October 22, 2013

SECURITY

To SIEM or Not to SIEM? Part I

7 min read

Security information and event management systems (SIEM, or sometimes SEIM) are intended to be the glue between an organization's various security tools. Security and other event log sources export their...

October 18, 2013

SECURITY

Getting a Handle on Your Data

9 min read

When your incident response team gets access to a new log data source, chances are that the events may not only contain an entirely different type of data, but may also be formatted differently than any log data source you already have. Having a data collection and organization standard will ease management and analysis of […]

October 9, 2013

SECURITY

Making Boring Logs Interesting

6 min read

This post centers around the practice of logging data - data from applications, devices, and networks - and how the components of data logging can help in the identification and remediation of network events.