Real-time logs in virtual data-center

  • Authors

    • Chalasani Srinivas K L EF
    2018-05-17
    https://doi.org/10.14419/ijet.v7i2.9434
  • Centralized Log Investigates Server, Log Management, VDC Builds, Elk Stacks Working Process, Virtualization, Vsphere Components, Real-Time Logs, Virtual Datacenter (Vsphere), Time-Based Analysis.
  • Penetration testing is a specialized security auditing methodology where a tester simulates an attack on a secured system. The main theme of this paper itself reflects how one can collect the massive amount of log files which are generated among virtual datacenters in real time which in turn also posses invisible information with excessive organization value. Such testing usually ranges across all aspects concerned to log management across a number of servers among virtual data centers. In fact, Virtualization limits the costs by reducing the need for physical hardware systems. Instead, require high-end hardware for processing. In the real-time scenario, we usually come across multiple logs among VCenter, ESXi, a VM which is very typical for performing manual analysis with a bit more time-consuming. Instead of configuring secure-ids automatically in a Centralized log management server gains a powerful full insight. Along with using accurate search algorithms, fields searching, which includes title, author, and also content comes out of searching, sorting fields, multiple-index search with merged results simultaneously updates files, with joint results grouping automatically configures few plugs among search engine file formats were effective measures in an investigation. Finally, by using the Flexibility Network Security Monitor, Traffic Investigation, offensive detection, Log Recording, Distributed inquiry with full program's ability can export data to a variety of visualization dashboard which exactly needed for Log Investigations across Virtual Data Centers in real time.

  • References

    1. [1] Author Peng Li,Lee Toderick,Joshua Noles “Provisioning Virtualized Datacenters Through Virtual Computing Lab†2010.

      [2] Forensics Log Invesigator(FLI)- a log analysis and Visulaization tool Thieu Van Tran Phan lowa State University 2007.

      [3] Tarun Prakash,kritika patel “Geo-Identification of Web users through Logs using ELk stack†Project ieee papar 2016.

      [4] Vmware White Paper “VMware Infrastructure Architecture Overview†[online] www: Vmware.com.

      [5] “The ELK Stack in a DevOps Environment†[online]: https://www.elastic.co/webinars/elk-stack-devops-environment.

      [6] Ready-To-Log" virtual appliance made by community for community!.

      [7] Feel free to follow SexiLog on“Building investigation toolâ€[online]:www.Sexilog.fr.

      [8] Varun Kumar Manik, Deepak Arora “Performance Comparios of Commercial VMM: ESXI, XEN, HYPER-V & KVM†india 2016.

      [9] Zhijian Wang, Yanqin Zhu“A Centralized HIDS Framework for Private Cloud†jupan 2017.

      [10] Joshua Ojo Nehinbe“Log Analyzer for Network Forensics and Incident Reporting†ieee 2010.

      [11] “riemman network monitoring and email forward â€[online]:http://riemann.io/api/riemann.email.html.

      [12] Pingkan P.i.Langi, Widyawan, Warsun Najib, Teguh Bharata Aji “An Evaluation of Twitter River and Logstash Performances as Elasticsearch inputs for Social Media Analysis of Twitterâ€IEEE 2015 https://doi.org/10.1109/ICTS.2015.7379895.

      [13] Dong Nguyen Doan, Gabriel Iuhasz“Tunning Logstash Garbage Collection for High Throughput in a Monitoring Platform†IEEE.

      [14] “Apache lucene fast string searching server help us Lucene Features†[online]: https://lucene.apache.org/core/.

      [15] James Turnbull (Author) “The logstash book (Log management made easy)â€.

  • Downloads

  • How to Cite

    Srinivas, C. (2018). Real-time logs in virtual data-center. International Journal of Engineering & Technology, 7(2), 746-749. https://doi.org/10.14419/ijet.v7i2.9434