Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: rlmorel

Thanks for that explanation. But it seems like a critical flaw for any security software to have such an easily exploited limit. Let the log file increase to the capacity of the drive because the only reason for it to grow to that ridiculous size is when someone is trying to obfuscate the log.


21 posted on 07/15/2021 8:16:07 PM PDT by bigbob
[ Post Reply | Private Reply | To 7 | View Replies ]


To: bigbob

Right. Like I said, often the size is configurable. In many systems I work with, when we set them up, we create a separate drive to be used for log files only, and will make it 200 or even 500MB. And then you have to configure logging behavior. I work with some sharp guys, and have learned a lot about this aspect.

But one thing that sucks is that there are many systems, when they cannot write to a file, the system either stops working, or begins working erratically.

The first few times I ran into this, I was flummoxed, but as I gained experience, it became one of the first things I looked at. Only took a second to peek...


24 posted on 07/15/2021 8:21:43 PM PDT by rlmorel (Leftists are The Droplet of Sewage in a gallon of ultra-pure clean water.)
[ Post Reply | Private Reply | To 21 | View Replies ]

To: bigbob

Let the log file increase to the capacity of the drive.


So, there are different types of logs, for different purposes. Security logs are usually not kept on the device itself for communications equipment, and there are often multiple logging modes - with the most thorough being debug logs. The debug logs can be more data than was actually handled, and can stress the operations of the devices.

Usually you have a log on the device itself to allow convenient first-step troubleshooting. As noted in a previous post, for Cisco devices that is (an inadequate) only 4kB as a default. The log files sizes are also large enough that if communications to the server are cut off for a time that enough records to troubleshoot are kept within the device itself. Major storage is sent to another server - which is why they want the Splunk data. https://en.wikipedia.org/wiki/Splunk

Splunk is an off-device application which collects these alerts and logs, and allows for long term storage (I’m told often a years worth of logs but can be longer if retention requires), and the ability to readily search, display, and graph/chart the data.


44 posted on 07/16/2021 6:53:54 AM PDT by lepton ("It is useless to attempt to reason a man out of a thing he was never reasoned into"--Jonathan Swift)
[ Post Reply | Private Reply | To 21 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson