On Mon, 24 Jan 2011, Leon Towns-von Stauber wrote:

> On Jan 24, 2011, at 6:51 AM, Jeremy Charles wrote:
>
>> Most of the log analysis/correlation threads in my E-mail archive seem to 
>> get a lot of "yeah we use Splunk for that."  Allow me to ask the question 
>> this way and see what happens...
>>
>> I pressed my coworkers for some specific examples of what they'd like to 
>> have a log correlator do for them.  Below is the non-trivial example that I 
>> received.  Do any log correlation products have this sort of sophistication?
>>
>>
>> The following sequence of events happen. Program sees the log entry for each 
>> event, makes the correlation, and sends us an email that [insert user here] 
>> is running bittorrent.
>>                Link comes up on switch port
>>                 802.1x authentication succeeds
>>                 DHCP address issued
>>                 User logs into domain
>>                 Firewall starts logging the BitTorrent URL signature
>
> I would imagine most any log correlation tool could do that. I know
> that SEC can, although you might have to use a series of contexts if
> the sequence is important. (That is, see the first message, set the
> first context. If the second message is seen while the first context
> is active, set the second context. Etc.)

I'll second the SEC suggestion.

I have both SEC and Splunk in my system, and I prefer to use each where 
they do a good job.

Splunk is great for doing ad-hoc searches through your logs 
(investigations, troubleshooting, etc), but having it do event correlation 
is really inefficient. What you do for 'event correlation' with splunk is 
to define a search and run it repeatedly. if you have enough logs that 
your search time is larger than what will fit in ram, this will really 
hammer your I/O system (on multiple systems if you have scaled your splunk 
install).

I have a 20 machine cluster running splunk (each with 8 cores, 64 G ram 
and 16 drives), doing a search on splunk ties up this entire cluster for 
the time of the search

I have a single box running SEC watching the same flow of logs.

Searching a 5 min window on splunk only takes a few seconds, but a few 
seconds per conditition that you are searching for starts adding up fast, 
and once you have a few dozen conditions that you are looking for on a 
frequent (say 1 min) basis, you can find that the splunk cluster is always 
busy (and therefor will not respond as fast when you need to do a search 
manually), beyond that everything starts slowing down more.

I currently have SEC looking for a few hundred events and combinations of 
conditions (with the expectation that I will have many more in the future) 
and it's loafing along

Splunk is expensive, and the hardware to run it well with a large amount 
of data (both high volume and long retention period) is also very 
expensive. I wouldn't willingly eliminate the capabilities that it gives 
me, but I also do not want to eat up that cluster's capacity with things 
that are better done elsewhere.

David Lang
_______________________________________________
Tech mailing list
Tech@lists.lopsa.org
https://lists.lopsa.org/cgi-bin/mailman/listinfo/tech
This list provided by the League of Professional System Administrators
 http://lopsa.org/

Reply via email to