PLAY PODCASTS
Why to log centrally? (osc24)

Why to log centrally? (osc24)

And how is it changing?

Chaos Computer Club - archive feed · Peter Czanik

June 28, 202439m 19s

Audio is streamed directly from the publisher (cdn.media.ccc.de) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.

Show Notes

Why is central logging so important? Convenience, availability and security. Convenience, as you have a single place to check instead of many. Availability, as you can check log messages, even if the sending host is unavailable. Security, as logs leave hosts as soon as they are produced, so an attacker has no chance to modify them. Developers, operators, and security have a single view of the whole network and can easily correlate events from multiple hosts. Often, the various tools to analyze log messages provide you with their own agents to forward logs to SIEM or other analytics tools. However, this is inefficient for several reasons. Most importantly, it is a waste of computing resources. You install multiple applications to do the same job: forwarding log messages. And these messages then travel through your network multiple times. So, what you should do instead is build a dedicated log management layer for central log collection. This ensures that log messages are collected only once. Using the OpenTelemetry protocol, logs, traces and metrics can be collected together, simplifying the architecture of collecting data about your infrastructure even further. From this talk, you can learn how to implement central logging using syslog-ng and how OpenTelemetry changes logging. Syslog-ng in openSUSE Tumbleweed already supports the OpenTelemetry protocol. Why is central logging so important? Convenience, availability and security. Convenience, as you have a single place to check instead of many. Availability, as you can check log messages, even if the sending host is unavailable. Security, as logs leave hosts as soon as they are produced, so an attacker has no chance to modify them. Developers, operators, and security have a single view of the whole network and can easily correlate events from multiple hosts. Often, the various tools to analyze log messages provide you with their own agents to forward logs to SIEM or other analytics tools. However, this is inefficient for several reasons. Most importantly, it is a waste of computing resources. You install multiple applications to do the same job: forwarding log messages. And these messages then travel through your network multiple times. So, what you should do instead is build a dedicated log management layer for central log collection. This ensures that log messages are collected only once. Using the OpenTelemetry protocol, logs, traces and metrics can be collected together, simplifying the architecture of collecting data about your infrastructure even further. From this talk, you can learn how to implement central logging using syslog-ng and how OpenTelemetry changes logging. Syslog-ng in openSUSE Tumbleweed already supports the OpenTelemetry protocol. about this event: https://c3voc.de

Topics

osc2444382024New Technologies