Series:
Advanced Tools for system data collection:
Lecture:
Logs in software: How to record the what, the when and the
who
A few questions addressed in
the lecture
|
|
Tuesday 9 March |
|
10:30 - 11:25 |
Lecture 7 |
Logs in software:
How to record the what, the when and the
who |
Luis Muñoz Mejías
|
Description
In this part we'll
highlight the relevance of having good quality logs that are
easy to understand by both humans and machines. We'll
describe the properties good logs must have (relevant
contents, unambiguous timestamping, easy classification,
integrity...), and the existing tools designed to meet these
requirements, with examples for both developers (what and
how to log) and system administrators (what to do with those
logs). Real-world examples of good and bad practices will be
shown, together with some ideas for improvement.
|
Audience
Software
developers and, perhaps, system administrators.
|
Pre-requisite
Understanding of UNIX
systems. Programming experience with C/C++/Perl/Python/Java
will help.
|
Questions |
-
What is your primary
source of information
when you suffer a
security
breach?
-
Logs
in software: Willing to
see
real-world
examples of good and bad
practices?
-
Can you find out who
runs that funny Grid
job? Can you tell on
which
site,
which
machine
it runs? Which files
were
used on
it? What
files were
created?
All the answers at
iCSC
Lecture 7
|
|
|