Publish Log From Naked Mulesoft Deployment to Graylog

Introduction

In this article, I discuss what Graylog is and how to perform a Naked deployment to a MuleSoft configuration in order to send a log to Graylog. 

MuleSoft Features

MuleSoft supports configuration and dependencies in log4j to publish logs to Graylog from CloudHub and Naked MuleSoft deployments.

Publish Log From Naked MuleSoft Deployment to Logz.io

Agenda

  • Introduction.
  • What is Logz.io ?
  • Naked deployed MuleSoft configuration to send log to Logz.io.

Introduction

MuleSoft Feature

MuleSoft supports configuration and dependencies in log4j to publish logs to logz.io from CloudHub and Naked Mulesoft deployment.

About Logz.io 

Logz.io provides a cloud-based log analysis service which is based on the open source log analysis platform — the ELK Stack (Elasticsearch, Logstash, Kibana).

Navigating Through Logs for Information Disclosure Requests

In a world of compliance and disclosure requests, the ability to investigate raw log files whilst shutting out the noise can not only be a time-saving maneuverer in your process but also reduce the risk of mistakes. The ability to analyse large volumes of log files, be it on the cloud, or hidden away in on-prem archives, will make a great difference on how your tech team operates.

Using higher education as an example. Every year, new students join a University and for IT teams, this means new logs. But it also means new devices on the networks, in Europe, this includes Eduroam, a 3rd party network point where logs may not be as easily accessible. On average, a student will bring in a mobile phone & laptop. But in this ever-growing IoT world, students are expected to bring more smart devices as well as devices such as tablets. This increases a student’s footprint on any SIEM solution.

How to Monitor Active Directory With Google Stackdriver

DirectoryConfirgure Google Stackdriver and Bindplane to monitor your Active Directory

What is Active Directory?

Active Directory stores information about objects handled on a network and makes it easy for admins and other users to access and utilize the data. When using the Active Directory Domain Service (AD DS) on a server, you get a domain controller. A domain controller automatically authenticates and authorizes all of the devices and users on the network, easily assigning and enforcing the security policies. Active Directory also includes the ability to create a schema that allows you to define classes and constraints for objects and attributes that are found in the directory. Another useful tool that can be found in AD is the replication service that distributes the directory data across the network.

Observability and Beyond — Building Resilient Application Infrastructure

The ability to construct observable apps can't be overstated.

The Journey from Being Reactive to Being Proactive

Things were quite simple in the old days. Proactively monitoring applications or infrastructure was not the norm. If there was a failure, a user would pick up the phone to inform the help-desk that the app is broken.

Troubleshooting was all reactive and the only path to resolution was for someone to roll up their sleeves and go in and look at log files and manually fix errors by themselves.