home.social

#logs — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #logs, aggregated by home.social.

  1. Как превратить тысячи лог-групп в десятки с помощью Grok-паттернов

    Представьте типичную картину: приложение генерирует тысячи логов в минуту, и в интерфейсе мониторинга вы видите сотни групп, хотя по факту проблема одна. Причина проста: в каждое сообщение вшит уникальный идентификатор, имя продукта или число, и система воспринимает каждый вариант как отдельное событие.

    habr.com/ru/articles/1034152/

    #logs #observability #log_grouping #apm

  2. Wavelog 2.4.2 has been released!

    Important Security Update

    This release fixes a critical vulnerability affecting all existing Wavelog installations from version 1.8 onward. While we have no indication of exploitation in the wild, the risk profile changes once the fix is public and we recommend updating to 2.4.2 promptly.

    github.com/wavelog/wavelog/rel

    #Wavelog #HamRadio #AmateurRadio #hamr #logging #HamLogging #radio #HamLog #log #logs

  3. Wavelog 2.4.2 has been released!

    Important Security Update

    This release fixes a critical vulnerability affecting all existing Wavelog installations from version 1.8 onward. While we have no indication of exploitation in the wild, the risk profile changes once the fix is public and we recommend updating to 2.4.2 promptly.

    github.com/wavelog/wavelog/rel

    #Wavelog #HamRadio #AmateurRadio #hamr #logging #HamLogging #radio #HamLog #log #logs

  4. Wavelog 2.4.2 has been released!

    Important Security Update

    This release fixes a critical vulnerability affecting all existing Wavelog installations from version 1.8 onward. While we have no indication of exploitation in the wild, the risk profile changes once the fix is public and we recommend updating to 2.4.2 promptly.

    github.com/wavelog/wavelog/rel

    #Wavelog #HamRadio #AmateurRadio #hamr #logging #HamLogging #radio #HamLog #log #logs

  5. Wavelog 2.4.2 has been released!

    Important Security Update

    This release fixes a critical vulnerability affecting all existing Wavelog installations from version 1.8 onward. While we have no indication of exploitation in the wild, the risk profile changes once the fix is public and we recommend updating to 2.4.2 promptly.

    github.com/wavelog/wavelog/rel

    #Wavelog #HamRadio #AmateurRadio #hamr #logging #HamLogging #radio #HamLog #log #logs

  6. Wavelog 2.4.2 has been released!

    Important Security Update

    This release fixes a critical vulnerability affecting all existing Wavelog installations from version 1.8 onward. While we have no indication of exploitation in the wild, the risk profile changes once the fix is public and we recommend updating to 2.4.2 promptly.

    github.com/wavelog/wavelog/rel

    #Wavelog #HamRadio #AmateurRadio #hamr #logging #HamLogging #radio #HamLog #log #logs

  7. Detección de Anomalías en Logs c…

    La detección de anomalías en logs es un proceso esencial para identificar comportamientos inusuales que podrían indicar problemas en la infraestructura o ataques cibernéticos.

    norvik.tech/news/analisis-fing

    #Technology #Fingerprinting #DeteccionDeAnomalias #Logs #VictoriaMetrics #NorvikTech #DesarrolloSoftware #TechInnovation

  8. Loki «Next Wave»: как Grafana Labs переписала правила логирования на GrafanaCON 2026

    Всем привет. В этой статье расскажу о новостях касаемо Loki. О том что было представлено на GrafanaCON 2026 в Барселоне. Чего нам ждать от новой архитектуры Loki, как она будет работать, и что прячет под капотом.

    habr.com/ru/articles/1030716/

    #grafana #loki #logs #observability #kafka #логи #графана #мониторинг

  9. Loki «Next Wave»: как Grafana Labs переписала правила логирования на GrafanaCON 2026

    Всем привет. В этой статье расскажу о новостях касаемо Loki. О том что было представлено на GrafanaCON 2026 в Барселоне. Чего нам ждать от новой архитектуры Loki, как она будет работать, и что прячет под капотом.

    habr.com/ru/articles/1030716/

    #grafana #loki #logs #observability #kafka #логи #графана #мониторинг

  10. Why Your Hotel Room Keycard Stores Far More Personal Data Than the Hotel Will Ever Admit

    Pourquoi la carte d'accès à votre chambre d'hôtel stocke bien plus de données personnelles que l'hôtel ne le reconnaîtra jamais.

    Vous passez votre carte à l'entrée, la jetez sur la table de chevet et n'y pensez plus. Ce mince rectangle de plastique posé à côté de votre lit d'hôtel contient plus d'informations personnelles que vous ne les confieriez volontiers à un inconnu dans la rue – et l'hôtel qui l'a émise n'a aucune obligation légale de vous en révéler le contenu. 😬

    1/

    riftlymedia.com/hotel-keycard-

    #Privacy #Data #Digital #GDPR #GPS #Surveillance #Technology #Logs

  11. When life gets busy, journaling is usually the first thing to go.

    MIRA makes it easier to just talk and keep showing up.

    apple.co/3V8rkho

    #video #journaling #logs #indiedev

  12. Go 1.21 introduced slog, but those logs are disconnected from traces. The otelslog bridge turns slog into an #OpenTelemetry-native log source, without rewriting your logging calls. Correlate #logs with #traces, replace span events, export via OTLP. 👉 eu1.hubs.ly/H0tSfNv0

    OpenTelemetry-Native Logging i...

  13. Wanna see what's going on in your services? 👀

    🌀 SEE (**seetui**) — journalctl-like log viewer with TUI

    💯 Multiple log buffers, filtering, search & navigation like Neovim

    🦀 Written in Rust & built with @ratatui_rs

    ⭐ GitHub: github.com/NustyFrozen/SEE

  14. GitHub - clemcer/LoggiFly: Get Alerts from your Docker Container Logs

    "Get Alerts from your Docker Container Logs. Contribute to clemcer/LoggiFly development by creating an account on GitHub."

    Link: github.com/clemcer/loggifly

    #linkdump #docker #logs #monitoring

  15. Naty @eclecticpassions ·

    has been back up for me yesterday, so I took the chance to implement what I converted my new build and script into a version that works on the `alpine/latest` CI runner which uses `bin/sh`...

    Read full note: burgeonlab.com/notes/2026/0411

    Syndicated via getindiekit.com

  16. #SourceHut has been back up for me yesterday, so I took the chance to implement what I converted my new #ci #hugo build and #deploy script into a version that works on the `alpine/latest` CI runner which uses `bin/sh`...

    Read full note: burgeonlab.com/notes/2026/0411

    Syndicated via getindiekit.com

    #backend #continuousintegration #srht #cicd #bash #scripts #makefile #make #logs #alpine

  17. #SourceHut has been back up for me yesterday, so I took the chance to implement what I converted my new #ci #hugo build and #deploy script into a version that works on the `alpine/latest` CI runner which uses `bin/sh`...

    Read full note: burgeonlab.com/notes/2026/0411

    Syndicated via getindiekit.com

    #backend #continuousintegration #srht #cicd #bash #scripts #makefile #make #logs #alpine

  18. #SourceHut has been back up for me yesterday, so I took the chance to implement what I converted my new #ci #hugo build and #deploy script into a version that works on the `alpine/latest` CI runner which uses `bin/sh`...

    Read full note: burgeonlab.com/notes/2026/0411

    Syndicated via getindiekit.com

    #backend #continuousintegration #srht #cicd #bash #scripts #makefile #make #logs #alpine

  19. #SourceHut has been back up for me yesterday, so I took the chance to implement what I converted my new #ci #hugo build and #deploy script into a version that works on the `alpine/latest` CI runner which uses `bin/sh`...

    Read full note: burgeonlab.com/notes/2026/0411

    Syndicated via getindiekit.com

    #backend #continuousintegration #srht #cicd #bash #scripts #makefile #make #logs #alpine

  20. Logs, logs, logs. That's what your applications and infrastructure are constantly generating. Let's discuss the patterns of sending logs to an aggregation tool for visualization and querying.

    #linux #observability #logs #grafana #loki #opentelemetry #go #programming

    youtu.be/15tRC7HEeGA

  21. @da_667 i would say go for the standalonelib? this would be a nice switch to use when building, more info is better #ntop-ng #netflow #logs

    Using nDPI as a standalone library when building Suricata is a powerful way to transform it from a traditional signature-based IDS/IPS into a smarter, more context-aware network security monitoring system. The integration addresses several key limitations of Suricata by adding a dedicated, high-performance deep packet inspection (DPI) engine .

    The table below summarizes the core reasons for this integration.
    Reason Explanation Key Benefits
    Massively Expanded Protocol Coverage Suricata natively supports ~20 protocols, while nDPI recognizes 450+ (including Cloud, IoT, and OT protocols) . Enables visibility into a wider range of applications and potential threats that Suricata would otherwise miss .
    Enhanced Threat Detection Capabilities nDPI adds behavioral analysis and risk detection to Suricata's signature-based approach . Allows detection of anomalies like encrypted traffic on standard ports, self-signed certificates, and command-and-control (C2) channels hiding in plain sight .
    More Powerful and Precise Rules The plugin introduces new rule keywords: ndpi-protocol and ndpi-risk . Enables writing rules based on detected application (e.g., TLS.YouTube) or specific risk (e.g., NDPI_BINARY_APPLICATION_TRANSFER), significantly reducing false positives .
    Richer Contextual Metadata Suricata's logs (EVE JSON) can be augmented with protocol and metadata identified by nDPI . Provides security analysts with deeper insights for faster threat hunting and forensic analysis without needing full packet captures .
    🛠️ How to Integrate nDPI with Suricata

    nDPI is integrated as a plugin that is not built into Suricata by default. You need to explicitly enable it during compilation. The process, as outlined in the official Suricata documentation, involves two main steps :

    Build Suricata with nDPI Support: When configuring your Suricata build from source, you must use the --enable-ndpi flag and point to your nDPI source code.
    bash

    ./configure --enable-ndpi --with-ndpi=/path/to/your/nDPI/source

    Load the Plugin: After installation, you need to ensure Suricata loads the nDPI plugin by adding its path to the suricata.yaml configuration file.
    yaml

    plugins:
    - /usr/lib/suricata/ndpi.so

    By building Suricata with the standalone nDPI library, you are essentially giving it a "second opinion" on network traffic. nDPI handles the heavy lifting of identifying countless applications and their potential risks, which then feeds directly into Suricata's core engine for alerting and logging. This makes your network defense far more robust and intelligent.

    Would you like to see more detailed examples of Suricata rules that use the ndpi-protocol and ndpi-risk keywords?

  22. Was eine kleine Aktivierung alles bewirken kann. Ums verrecken wollte der DHCP Dienst unter Kea DHCP nicht funktionieren und ich kam auch nicht darauf in den Logs zuschauen, was ich letztendlich dann doch getan habe. Ein zweiter DHCP Dienst war aktiviert. Naja wieder was gelernt. In des Logs schauen und verstehen was da los ist.

    #OPNsense #Logs #DHCP

  23. Made a transparent network bridge on which sits between router & switch, monitoring traffic for , and capture and analyze packets → ships with ingest pipeline → setup of dashboard to visualise data is defined in flake itself so using the flake will give the same dashboard. details here codeberg.org/adingbatponder/re
    Hardware: HP EliteDesk 800 G1 SFF 16Gb RAM & jacob.de/produkte/Intel-Ethern

  24. Oh wow, #OpenAI is #scraping #CT #logs like a kid in a candy store 🍬. Apparently, they're on a mission to hunt down... robots.txt files? 🤖🗂️ Because who doesn't love a treasure trove of 404 errors and TLS certificates? 💾🔍
    benjojo.co.uk/u/benjojo/h/Gxy2 #robots_txt #404_errors #TLS_certificates #tech_news #HackerNews #ngated

  25. Linux-Befehle zum Einsehen von Dateien: Eine Sysadmin-Übersicht (cat, less/more, heat/tail)

    Als Linux-Systemadministrator ist das schnelle und effiziente Einsehen von Dateien ein täglicher Bestandteil der Arbeit – sei es zur Fehlersuche in Logs, Konfigurationsprüfung oder Datenanalyse. Dieser Blogpost gibt eine praxisnahe Übersicht über die Kernbefehle cat, less/more sowie head/tail. Jeder Befehl wird mit typischen Sysadmin-Kontexten beschrieben, um die passende Wahl zu erleichnen. cat: Schnelle Gesamtanzeige Der Befehl cat concateniert und zeigt den gesamten Inhalt einer […]

    andreas-moor.de/linux-befehle-

  26. Kompression mit bzip2 Linux: Grundlagen, Optionen und Beispiele

    bzip2 ist ein leistungsstarkes Kompressionswerkzeug unter Linux, das den Burrows-Wheeler-Algorithmus nutzt. Es erreicht eine deutlich bessere Kompressionsrate als gzip, benötigt dafür aber mehr Rechenzeit. Ideal für Speicherplatz-kritische Szenarien wie große Textdateien oder Logs. Wichtige Optionen von bzip2 -k : Originaldatei nach Kompression behalten. Standardmäßig wird die Eingabedatei gelöscht. bzip2 -k datei.txt -d oder bunzip2 (Alias) : Dekomprimiert eine .bz2-Datei. bunzip2 […]

    andreas-moor.de/kompression-mi

  27. Kompression mit gzip: Grundlagen, Optionen und Beispiele

    gzip ist eines der meistgenutzten Kompressionswerkzeuge unter Linux, das einzelne Dateien mit dem schnellen DEFLATE-Algorithmus komprimiert. Es ist besonders nützlich für alltägliche Kompressionsaufgaben, bei denen Geschwindigkeit wichtiger ist als maximale Speicherersparnis. Wichtige Optionen von gzip -k : Originaldatei nach Kompression behalten. Standardmäßig entfernt gzip die Eingabedatei nach Kompression. gzip -k datei.txt -d oder gunzip (Alias): Dekomprimiert eine .gz-Datei. […]

    andreas-moor.de/kompression-mi

  28. Open source Telemetry Controller developed by Sándor Guba, Axoflow founder and CTO, on top of OpenTelemetry Collector turns log streams into Kubernetes resources. It gives isolation and enables subscribing for log topics per relevance.
    linkedin.com/posts/horovits_os
    #OSSummit #opentelemetry #logs #logging #loganalytics #opensource #cloudnative #kubernetes

  29. Open source Telemetry Controller developed by Sándor Guba, Axoflow founder and CTO, on top of OpenTelemetry Collector turns log streams into Kubernetes resources. It gives isolation and enables subscribing for log topics per relevance.
    linkedin.com/posts/horovits_os

  30. Open source Telemetry Controller developed by Sándor Guba, Axoflow founder and CTO, on top of OpenTelemetry Collector turns log streams into Kubernetes resources. It gives isolation and enables subscribing for log topics per relevance.
    linkedin.com/posts/horovits_os
    #OSSummit #opentelemetry #logs #logging #loganalytics #opensource #cloudnative #kubernetes

  31. Open source Telemetry Controller developed by Sándor Guba, Axoflow founder and CTO, on top of OpenTelemetry Collector turns log streams into Kubernetes resources. It gives isolation and enables subscribing for log topics per relevance.
    linkedin.com/posts/horovits_os
    #OSSummit #opentelemetry #logs #logging #loganalytics #opensource #cloudnative #kubernetes

  32. Open source Telemetry Controller developed by Sándor Guba, Axoflow founder and CTO, on top of OpenTelemetry Collector turns log streams into Kubernetes resources. It gives isolation and enables subscribing for log topics per relevance.
    linkedin.com/posts/horovits_os
    #OSSummit #opentelemetry #logs #logging #loganalytics #opensource #cloudnative #kubernetes

  33. Создание правил SIEM с использованием категорийных моделей

    В статье рассказываю о возможности применения концепции категорийных моделей для выявления аномалий в действиях пользователей при помощи SIEM. Модели позволяют описать и использовать профиль типичной активности пользователей и других сущностей. У себя используем их для выявления кражи учетных записей, перемещения по инфраструктуре (lateral movement). Кроме того, именно правила "Первый раз X сделал Y" стали использоваться для прямых уведомлений нашим сотрудникам из SIEM.

    habr.com/ru/articles/832074/

    #siem #soc #logging #logs #ueba

  34. Создание правил SIEM с использованием категорийных моделей

    В статье рассказываю о возможности применения концепции категорийных моделей для выявления аномалий в действиях пользователей при помощи SIEM. Модели позволяют описать и использовать профиль типичной активности пользователей и других сущностей. У себя используем их для выявления кражи учетных записей, перемещения по инфраструктуре (lateral movement). Кроме того, именно правила "Первый раз X сделал Y" стали использоваться для прямых уведомлений нашим сотрудникам из SIEM.

    habr.com/ru/articles/832074/

    #siem #soc #logging #logs #ueba

  35. Создание правил SIEM с использованием категорийных моделей

    В статье рассказываю о возможности применения концепции категорийных моделей для выявления аномалий в действиях пользователей при помощи SIEM. Модели позволяют описать и использовать профиль типичной активности пользователей и других сущностей. У себя используем их для выявления кражи учетных записей, перемещения по инфраструктуре (lateral movement). Кроме того, именно правила "Первый раз X сделал Y" стали использоваться для прямых уведомлений нашим сотрудникам из SIEM.

    habr.com/ru/articles/832074/

    #siem #soc #logging #logs #ueba

  36. Canopsis 🚀 Centralisez tous les événements de votre SI en un cockpit unique !

    Solutions de #supervision, référentiels, #ITSM, #CMDB, applications métiers, outils de #ticketing, #logs… Vos sources de données sont variées et Canopsis s’interconnecte déjà avec une 100aine d'entre elles.

    Passez à l'hypervision #OpenSource !

    Plus d'informations sur canopsis.fr

  37. Canopsis 🚀 Centralisez tous les événements de votre SI en un cockpit unique !

    Solutions de #supervision, référentiels, #ITSM, #CMDB, applications métiers, outils de #ticketing, #logs… Vos sources de données sont variées et Canopsis s’interconnecte déjà avec une 100aine d'entre elles.

    Passez à l'hypervision #OpenSource !

    Plus d'informations sur canopsis.fr