#logs — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #logs, aggregated by home.social.
-
#mwgic #2026 #Google #Android #CyberSecurity #Intrusion #Logging #Logs #LogFiles #Spyware #Stalkerware
Google launches new Android security feature to help uncover spyware attacks | TechCrunch https://share.google/S3v52pjCxEnIhzuPR
-
#mwgic #2026 #Google #Android #CyberSecurity #Intrusion #Logging #Logs #LogFiles #Spyware #Stalkerware
Google launches new Android security feature to help uncover spyware attacks | TechCrunch https://share.google/S3v52pjCxEnIhzuPR
-
#mwgic #2026 #Google #Android #CyberSecurity #Intrusion #Logging #Logs #LogFiles #Spyware #Stalkerware
Google launches new Android security feature to help uncover spyware attacks | TechCrunch https://share.google/S3v52pjCxEnIhzuPR
-
GitHub Actions issued GitHub_TOKEN disclosure in GitHub Actions logs
https://github.com/composer/composer/security/advisories/GHSA-f9f8-rm49-7jv2
#HackerNews #GitHub #Actions #GitHub_TOKEN #security #disclosure #logs #GitHub #security
-
Как превратить тысячи лог-групп в десятки с помощью Grok-паттернов
Представьте типичную картину: приложение генерирует тысячи логов в минуту, и в интерфейсе мониторинга вы видите сотни групп, хотя по факту проблема одна. Причина проста: в каждое сообщение вшит уникальный идентификатор, имя продукта или число, и система воспринимает каждый вариант как отдельное событие.
-
Wavelog 2.4.2 has been released!
Important Security Update
This release fixes a critical vulnerability affecting all existing Wavelog installations from version 1.8 onward. While we have no indication of exploitation in the wild, the risk profile changes once the fix is public and we recommend updating to 2.4.2 promptly.
https://github.com/wavelog/wavelog/releases/tag/2.4.2
#Wavelog #HamRadio #AmateurRadio #hamr #logging #HamLogging #radio #HamLog #log #logs
-
Wavelog 2.4.2 has been released!
Important Security Update
This release fixes a critical vulnerability affecting all existing Wavelog installations from version 1.8 onward. While we have no indication of exploitation in the wild, the risk profile changes once the fix is public and we recommend updating to 2.4.2 promptly.
https://github.com/wavelog/wavelog/releases/tag/2.4.2
#Wavelog #HamRadio #AmateurRadio #hamr #logging #HamLogging #radio #HamLog #log #logs
-
Wavelog 2.4.2 has been released!
Important Security Update
This release fixes a critical vulnerability affecting all existing Wavelog installations from version 1.8 onward. While we have no indication of exploitation in the wild, the risk profile changes once the fix is public and we recommend updating to 2.4.2 promptly.
https://github.com/wavelog/wavelog/releases/tag/2.4.2
#Wavelog #HamRadio #AmateurRadio #hamr #logging #HamLogging #radio #HamLog #log #logs
-
Wavelog 2.4.2 has been released!
Important Security Update
This release fixes a critical vulnerability affecting all existing Wavelog installations from version 1.8 onward. While we have no indication of exploitation in the wild, the risk profile changes once the fix is public and we recommend updating to 2.4.2 promptly.
https://github.com/wavelog/wavelog/releases/tag/2.4.2
#Wavelog #HamRadio #AmateurRadio #hamr #logging #HamLogging #radio #HamLog #log #logs
-
Wavelog 2.4.2 has been released!
Important Security Update
This release fixes a critical vulnerability affecting all existing Wavelog installations from version 1.8 onward. While we have no indication of exploitation in the wild, the risk profile changes once the fix is public and we recommend updating to 2.4.2 promptly.
https://github.com/wavelog/wavelog/releases/tag/2.4.2
#Wavelog #HamRadio #AmateurRadio #hamr #logging #HamLogging #radio #HamLog #log #logs
-
Detección de Anomalías en Logs c…
La detección de anomalías en logs es un proceso esencial para identificar comportamientos inusuales que podrían indicar problemas en la infraestructura o ataques cibernéticos.
https://norvik.tech/news/analisis-fingerprinting-logs-anomalias
#Technology #Fingerprinting #DeteccionDeAnomalias #Logs #VictoriaMetrics #NorvikTech #DesarrolloSoftware #TechInnovation
-
A Mutating Webhook to automatically strip PII from K8s logs
https://github.com/aragossa/pii-shield
#HackerNews #MutatingWebhook #PII #K8s #Kubernetes #Logs #Security
-
Loki «Next Wave»: как Grafana Labs переписала правила логирования на GrafanaCON 2026
Всем привет. В этой статье расскажу о новостях касаемо Loki. О том что было представлено на GrafanaCON 2026 в Барселоне. Чего нам ждать от новой архитектуры Loki, как она будет работать, и что прячет под капотом.
https://habr.com/ru/articles/1030716/
#grafana #loki #logs #observability #kafka #логи #графана #мониторинг
-
Loki «Next Wave»: как Grafana Labs переписала правила логирования на GrafanaCON 2026
Всем привет. В этой статье расскажу о новостях касаемо Loki. О том что было представлено на GrafanaCON 2026 в Барселоне. Чего нам ждать от новой архитектуры Loki, как она будет работать, и что прячет под капотом.
https://habr.com/ru/articles/1030716/
#grafana #loki #logs #observability #kafka #логи #графана #мониторинг
-
Why Your Hotel Room Keycard Stores Far More Personal Data Than the Hotel Will Ever Admit
Pourquoi la carte d'accès à votre chambre d'hôtel stocke bien plus de données personnelles que l'hôtel ne le reconnaîtra jamais.
Vous passez votre carte à l'entrée, la jetez sur la table de chevet et n'y pensez plus. Ce mince rectangle de plastique posé à côté de votre lit d'hôtel contient plus d'informations personnelles que vous ne les confieriez volontiers à un inconnu dans la rue – et l'hôtel qui l'a émise n'a aucune obligation légale de vous en révéler le contenu. 😬
1/
https://riftlymedia.com/hotel-keycard-personal-data-privacy/
#Privacy #Data #Digital #GDPR #GPS #Surveillance #Technology #Logs
-
When life gets busy, journaling is usually the first thing to go.
MIRA makes it easier to just talk and keep showing up.
-
Go 1.21 introduced slog, but those logs are disconnected from traces. The otelslog bridge turns slog into an #OpenTelemetry-native log source, without rewriting your logging calls. Correlate #logs with #traces, replace span events, export via OTLP. 👉 eu1.hubs.ly/H0tSfNv0
OpenTelemetry-Native Logging i... -
Wanna see what's going on in your services? 👀
🌀 SEE (**seetui**) — journalctl-like log viewer with TUI
💯 Multiple log buffers, filtering, search & navigation like Neovim
🦀 Written in Rust & built with @ratatui_rs
⭐ GitHub: https://github.com/NustyFrozen/SEE
#rustlang #ratatui #tui #linux #logs #journalctl #observability #terminal
-
I prompted ChatGPT, Claude, Perplexity, and Gemini and watched my Nginx logs
https://surfacedby.com/blog/nginx-logs-ai-traffic-vs-referral-traffic
#HackerNews #AI #Traffic #Nginx #Logs #ChatGPT #Referral #Traffic #Gemini #Perplexity
-
I prompted ChatGPT, Claude, Perplexity, and Gemini and watched my Nginx logs
https://surfacedby.com/blog/nginx-logs-ai-traffic-vs-referral-traffic
#HackerNews #AI #Traffic #Nginx #Logs #ChatGPT #Referral #Traffic #Gemini #Perplexity
-
I prompted ChatGPT, Claude, Perplexity, and Gemini and watched my Nginx logs
https://surfacedby.com/blog/nginx-logs-ai-traffic-vs-referral-traffic
#HackerNews #AI #Traffic #Nginx #Logs #ChatGPT #Referral #Traffic #Gemini #Perplexity
-
I prompted ChatGPT, Claude, Perplexity, and Gemini and watched my Nginx logs
https://surfacedby.com/blog/nginx-logs-ai-traffic-vs-referral-traffic
#HackerNews #AI #Traffic #Nginx #Logs #ChatGPT #Referral #Traffic #Gemini #Perplexity
-
I prompted ChatGPT, Claude, Perplexity, and Gemini and watched my Nginx logs
https://surfacedby.com/blog/nginx-logs-ai-traffic-vs-referral-traffic
#HackerNews #AI #Traffic #Nginx #Logs #ChatGPT #Referral #Traffic #Gemini #Perplexity
-
GitHub - clemcer/LoggiFly: Get Alerts from your Docker Container Logs
"Get Alerts from your Docker Container Logs. Contribute to clemcer/LoggiFly development by creating an account on GitHub."
-
#SourceHut has been back up for me yesterday, so I took the chance to implement what I converted my new #ci #hugo build and #deploy script into a version that works on the `alpine/latest` CI runner which uses `bin/sh`...
Read full note: https://burgeonlab.com/notes/2026/0411-183833
Syndicated via https://getindiekit.com
#backend #continuousintegration #srht #cicd #bash #scripts #makefile #make #logs #alpine
-
#SourceHut has been back up for me yesterday, so I took the chance to implement what I converted my new #ci #hugo build and #deploy script into a version that works on the `alpine/latest` CI runner which uses `bin/sh`...
Read full note: https://burgeonlab.com/notes/2026/0411-183833
Syndicated via https://getindiekit.com
#backend #continuousintegration #srht #cicd #bash #scripts #makefile #make #logs #alpine
-
#SourceHut has been back up for me yesterday, so I took the chance to implement what I converted my new #ci #hugo build and #deploy script into a version that works on the `alpine/latest` CI runner which uses `bin/sh`...
Read full note: https://burgeonlab.com/notes/2026/0411-183833
Syndicated via https://getindiekit.com
#backend #continuousintegration #srht #cicd #bash #scripts #makefile #make #logs #alpine
-
#SourceHut has been back up for me yesterday, so I took the chance to implement what I converted my new #ci #hugo build and #deploy script into a version that works on the `alpine/latest` CI runner which uses `bin/sh`...
Read full note: https://burgeonlab.com/notes/2026/0411-183833
Syndicated via https://getindiekit.com
#backend #continuousintegration #srht #cicd #bash #scripts #makefile #make #logs #alpine
-
#SourceHut has been back up for me yesterday, so I took the chance to implement what I converted my new #ci #hugo build and #deploy script into a version that works on the `alpine/latest` CI runner which uses `bin/sh`...
Read full note: https://burgeonlab.com/notes/2026/0411-183833
Syndicated via https://getindiekit.com
#backend #continuousintegration #srht #cicd #bash #scripts #makefile #make #logs #alpine
-
Logs, logs, logs. That's what your applications and infrastructure are constantly generating. Let's discuss the patterns of sending logs to an aggregation tool for visualization and querying.
#linux #observability #logs #grafana #loki #opentelemetry #go #programming
-
@da_667 i would say go for the standalonelib? this would be a nice switch to use when building, more info is better #ntop-ng #netflow #logs
Using nDPI as a standalone library when building Suricata is a powerful way to transform it from a traditional signature-based IDS/IPS into a smarter, more context-aware network security monitoring system. The integration addresses several key limitations of Suricata by adding a dedicated, high-performance deep packet inspection (DPI) engine .
The table below summarizes the core reasons for this integration.
Reason Explanation Key Benefits
Massively Expanded Protocol Coverage Suricata natively supports ~20 protocols, while nDPI recognizes 450+ (including Cloud, IoT, and OT protocols) . Enables visibility into a wider range of applications and potential threats that Suricata would otherwise miss .
Enhanced Threat Detection Capabilities nDPI adds behavioral analysis and risk detection to Suricata's signature-based approach . Allows detection of anomalies like encrypted traffic on standard ports, self-signed certificates, and command-and-control (C2) channels hiding in plain sight .
More Powerful and Precise Rules The plugin introduces new rule keywords: ndpi-protocol and ndpi-risk . Enables writing rules based on detected application (e.g., TLS.YouTube) or specific risk (e.g., NDPI_BINARY_APPLICATION_TRANSFER), significantly reducing false positives .
Richer Contextual Metadata Suricata's logs (EVE JSON) can be augmented with protocol and metadata identified by nDPI . Provides security analysts with deeper insights for faster threat hunting and forensic analysis without needing full packet captures .
🛠️ How to Integrate nDPI with SuricatanDPI is integrated as a plugin that is not built into Suricata by default. You need to explicitly enable it during compilation. The process, as outlined in the official Suricata documentation, involves two main steps :
Build Suricata with nDPI Support: When configuring your Suricata build from source, you must use the --enable-ndpi flag and point to your nDPI source code.
bash./configure --enable-ndpi --with-ndpi=/path/to/your/nDPI/source
Load the Plugin: After installation, you need to ensure Suricata loads the nDPI plugin by adding its path to the suricata.yaml configuration file.
yamlplugins:
- /usr/lib/suricata/ndpi.soBy building Suricata with the standalone nDPI library, you are essentially giving it a "second opinion" on network traffic. nDPI handles the heavy lifting of identifying countless applications and their potential risks, which then feeds directly into Suricata's core engine for alerting and logging. This makes your network defense far more robust and intelligent.
Would you like to see more detailed examples of Suricata rules that use the ndpi-protocol and ndpi-risk keywords?
-
Was eine kleine Aktivierung alles bewirken kann. Ums verrecken wollte der DHCP Dienst unter Kea DHCP nicht funktionieren und ich kam auch nicht darauf in den Logs zuschauen, was ich letztendlich dann doch getan habe. Ein zweiter DHCP Dienst war aktiviert. Naja wieder was gelernt. In des Logs schauen und verstehen was da los ist.
-
Made a transparent network bridge on #NixOS which sits between router & #LAN switch, monitoring traffic for #IDS #intrusiondetection , #Suricata and #Zeek capture and analyze packets → #Filebeat ships #logs → #Elasticsearch with #GeoIP ingest pipeline → #Grafana setup of dashboard to visualise data is defined in flake itself so using the flake will give the same dashboard. #flake details here https://codeberg.org/adingbatponder/reticulum_nixos_flake/src/branch/main/features/network-appliance
Hardware: HP EliteDesk 800 G1 SFF 16Gb RAM & https://www.jacob.de/produkte/Intel-Ethernet-Server-Adapter-I350-T4-I350T4V2-artnr-2094756.html #i350t4 -
Oh wow, #OpenAI is #scraping #CT #logs like a kid in a candy store 🍬. Apparently, they're on a mission to hunt down... robots.txt files? 🤖🗂️ Because who doesn't love a treasure trove of 404 errors and TLS certificates? 💾🔍
https://benjojo.co.uk/u/benjojo/h/Gxy2qrCkn1Y327Y6D3 #robots_txt #404_errors #TLS_certificates #tech_news #HackerNews #ngated -
Linux-Befehle zum Einsehen von Dateien: Eine Sysadmin-Übersicht (cat, less/more, heat/tail)
Als Linux-Systemadministrator ist das schnelle und effiziente Einsehen von Dateien ein täglicher Bestandteil der Arbeit – sei es zur Fehlersuche in Logs, Konfigurationsprüfung oder Datenanalyse. Dieser Blogpost gibt eine praxisnahe Übersicht über die Kernbefehle cat, less/more sowie head/tail. Jeder Befehl wird mit typischen Sysadmin-Kontexten beschrieben, um die passende Wahl zu erleichnen. cat: Schnelle Gesamtanzeige Der Befehl cat concateniert und zeigt den gesamten Inhalt einer […]https://andreas-moor.de/linux-befehle-zum-einsehen-von-dateien-eine-sysadmin-uebersicht/
-
Kompression mit bzip2 Linux: Grundlagen, Optionen und Beispiele
bzip2 ist ein leistungsstarkes Kompressionswerkzeug unter Linux, das den Burrows-Wheeler-Algorithmus nutzt. Es erreicht eine deutlich bessere Kompressionsrate als gzip, benötigt dafür aber mehr Rechenzeit. Ideal für Speicherplatz-kritische Szenarien wie große Textdateien oder Logs. Wichtige Optionen von bzip2 -k : Originaldatei nach Kompression behalten. Standardmäßig wird die Eingabedatei gelöscht. bzip2 -k datei.txt -d oder bunzip2 (Alias) : Dekomprimiert eine .bz2-Datei. bunzip2 […]https://andreas-moor.de/kompression-mit-bzip2-linux-grundlagen-optionen-und-beispiele/
-
Kompression mit gzip: Grundlagen, Optionen und Beispiele
gzip ist eines der meistgenutzten Kompressionswerkzeuge unter Linux, das einzelne Dateien mit dem schnellen DEFLATE-Algorithmus komprimiert. Es ist besonders nützlich für alltägliche Kompressionsaufgaben, bei denen Geschwindigkeit wichtiger ist als maximale Speicherersparnis. Wichtige Optionen von gzip -k : Originaldatei nach Kompression behalten. Standardmäßig entfernt gzip die Eingabedatei nach Kompression. gzip -k datei.txt -d oder gunzip (Alias): Dekomprimiert eine .gz-Datei. […]https://andreas-moor.de/kompression-mit-gzip-grundlagen-optionen-und-beispiele/
-
Open source Telemetry Controller developed by Sándor Guba, Axoflow founder and CTO, on top of OpenTelemetry Collector turns log streams into Kubernetes resources. It gives isolation and enables subscribing for log topics per relevance.
https://www.linkedin.com/posts/horovits_ossummit-activity-7241755574994911232-MCqe
#OSSummit #opentelemetry #logs #logging #loganalytics #opensource #cloudnative #kubernetes -
Open source Telemetry Controller developed by Sándor Guba, Axoflow founder and CTO, on top of OpenTelemetry Collector turns log streams into Kubernetes resources. It gives isolation and enables subscribing for log topics per relevance.
https://www.linkedin.com/posts/horovits_ossummit-activity-7241755574994911232-MCqe
#OSSummit #opentelemetry #logs #logging #loganalytics #opensource #cloudnative #kubernetes -
Open source Telemetry Controller developed by Sándor Guba, Axoflow founder and CTO, on top of OpenTelemetry Collector turns log streams into Kubernetes resources. It gives isolation and enables subscribing for log topics per relevance.
https://www.linkedin.com/posts/horovits_ossummit-activity-7241755574994911232-MCqe
#OSSummit #opentelemetry #logs #logging #loganalytics #opensource #cloudnative #kubernetes -
Open source Telemetry Controller developed by Sándor Guba, Axoflow founder and CTO, on top of OpenTelemetry Collector turns log streams into Kubernetes resources. It gives isolation and enables subscribing for log topics per relevance.
https://www.linkedin.com/posts/horovits_ossummit-activity-7241755574994911232-MCqe
#OSSummit #opentelemetry #logs #logging #loganalytics #opensource #cloudnative #kubernetes -
Open source Telemetry Controller developed by Sándor Guba, Axoflow founder and CTO, on top of OpenTelemetry Collector turns log streams into Kubernetes resources. It gives isolation and enables subscribing for log topics per relevance.
https://www.linkedin.com/posts/horovits_ossummit-activity-7241755574994911232-MCqe
#OSSummit #opentelemetry #logs #logging #loganalytics #opensource #cloudnative #kubernetes -
Создание правил SIEM с использованием категорийных моделей
В статье рассказываю о возможности применения концепции категорийных моделей для выявления аномалий в действиях пользователей при помощи SIEM. Модели позволяют описать и использовать профиль типичной активности пользователей и других сущностей. У себя используем их для выявления кражи учетных записей, перемещения по инфраструктуре (lateral movement). Кроме того, именно правила "Первый раз X сделал Y" стали использоваться для прямых уведомлений нашим сотрудникам из SIEM.
-
Создание правил SIEM с использованием категорийных моделей
В статье рассказываю о возможности применения концепции категорийных моделей для выявления аномалий в действиях пользователей при помощи SIEM. Модели позволяют описать и использовать профиль типичной активности пользователей и других сущностей. У себя используем их для выявления кражи учетных записей, перемещения по инфраструктуре (lateral movement). Кроме того, именно правила "Первый раз X сделал Y" стали использоваться для прямых уведомлений нашим сотрудникам из SIEM.
-
Создание правил SIEM с использованием категорийных моделей
В статье рассказываю о возможности применения концепции категорийных моделей для выявления аномалий в действиях пользователей при помощи SIEM. Модели позволяют описать и использовать профиль типичной активности пользователей и других сущностей. У себя используем их для выявления кражи учетных записей, перемещения по инфраструктуре (lateral movement). Кроме того, именно правила "Первый раз X сделал Y" стали использоваться для прямых уведомлений нашим сотрудникам из SIEM.
-
Canopsis 🚀 Centralisez tous les événements de votre SI en un cockpit unique !
Solutions de #supervision, référentiels, #ITSM, #CMDB, applications métiers, outils de #ticketing, #logs… Vos sources de données sont variées et Canopsis s’interconnecte déjà avec une 100aine d'entre elles.
Passez à l'hypervision #OpenSource !
Plus d'informations sur canopsis.fr
-
Canopsis 🚀 Centralisez tous les événements de votre SI en un cockpit unique !
Solutions de #supervision, référentiels, #ITSM, #CMDB, applications métiers, outils de #ticketing, #logs… Vos sources de données sont variées et Canopsis s’interconnecte déjà avec une 100aine d'entre elles.
Passez à l'hypervision #OpenSource !
Plus d'informations sur canopsis.fr