Logging - Monitoring C21: Difference between revisions
From ICO wiki
Jump to navigationJump to search
Line 14: | Line 14: | ||
In order to understand how to set up the Graylog service as well as understand its crucial roles. We decided to choose Graylog as our application for Logging and Monitoring. Below are our objectives which would be expected to achieve later on: | In order to understand how to set up the Graylog service as well as understand its crucial roles. We decided to choose Graylog as our application for Logging and Monitoring. Below are our objectives which would be expected to achieve later on: | ||
- How to install Graylog on Ubuntu 14.04/16.0. | ''- How to install Graylog on Ubuntu 14.04/16.0. | ||
- How to use Graylog to protect servers. | - How to use Graylog to protect servers. | ||
'' | |||
(..more) | (..more) | ||
Revision as of 16:31, 5 October 2016
Logging and Monitoring with Graylog
Course: Logging and Monitoring - Lecturer: Margus Ernits
Group : Cyber Security Engineering (C21)
Team members: Ender Phan, Kustas Kurval, Sheela Gowry Sumathi Raju, Artur Vincent Kerge
Page created by : October 05, 2016
Abstract
In order to understand how to set up the Graylog service as well as understand its crucial roles. We decided to choose Graylog as our application for Logging and Monitoring. Below are our objectives which would be expected to achieve later on:
- How to install Graylog on Ubuntu 14.04/16.0.
- How to use Graylog to protect servers. (..more)