Logs are not just a stream of information. Logs and events can tell a story about what happened, when, why, how, and who done it. Thus, any company ignoring their logs have a real challenge when dealing with information security.
To help your logs tell the story, it’s best to augment them with other bits of information. Typically, this is done after the fact by an analyst or investigator. The down side to this, is that it’s after the event has happened, and in a lot of scenarios, the augmented data has changed. The IP for a domain name has changed for example.
Beyond that, there is already intelligence lists that provide details on any given IP, Domain name, file hash and other metadata.
In this post, we’ll explore bridging the Collective Intelligence Framework version 2 (CIFv2) and those logs using Logstash.
This is cataloging how I build my own MusicBrainz Server. Dated: March 2013. This makes the assumption you know how to manage virtual machines, and use linux.
2015 Jeep Cherokee Trailhawk
Stock - for now :)
2003 Jeep KJ (Liberty) Sport with Sunroof (RIP 2014)
Head Unit - Sony Xplod CDX-MP40
300Watt Amp - Pioneer GM-3100T
300Watt Sub - Pioneer TS-WX100BP
CB Radio and Antenna - Howto
EVIC (56042749AE Preferably) - Howto
Cruise Control - Howto (Writen by Me!)
Rear Window Protector - Howto
Power Seats - Howto
5 Bolt the Rear Spare - Howto
Rear Cabin Light - Howto
Foot Curisy Lights - Howto
My How-To's are coming from here.
Click Here for More