On construction of a network log management system using ELK Stack with Ceph

被引:8
作者
Yang, Chao-Tung [1 ]
Kristiani, Endah [1 ,2 ,3 ]
Wang, Yuan-Ting [4 ]
Min, Geyong [5 ]
Lai, Ching-Han [1 ]
Jiang, Wei-Je [1 ]
机构
[1] Tunghai Univ, Dept Comp Sci, 1727,Sec 4,Taiwan Blvd, Taichung 40704, Taiwan
[2] Tunghai Univ, Dept Ind Engn & Enterprise Informat, 1727,Sec 4,Taiwan Blvd, Taichung 40704, Taiwan
[3] Krida Wacana Christian Univ, Fac Engn & Comp Sci, Dept Informat, Jakarta 11470, Indonesia
[4] Chunghwa Telecom Labs, Cloud Comp Lab, 99 Dianyan Rd, Taoyuan 326, Taiwan
[5] Univ Exeter, Coll Engn Math & Phys Sci, Dept Math & Comp Sci, Exeter EX4 4QF, Devon, England
关键词
Log management system; ELK Stack; Ceph; Alluxio; Elasticsearch; Logstash; Kibana;
D O I
10.1007/s11227-019-02853-2
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
A log management system is essential for the networks administrator. With a log management tool, we can collect, store, analyze, archive, and finally dispose of the log information. In this paper, we propose the architecture model of a log management system using ELK Stack with Ceph to provide a safe network, good Wi-Fi signal strength, and adequate backup data mechanism. In this case, we use our campus data of Wi-Fi log and NetFlow log. First, we collect and store data of our Wi-Fi log using Filebeats tool, and then, we use Elasticsearch, Logstash, and Kibana Stack to visualize the Wi-Fi log data. Second, we collect and store our NetFlow log using NFDUMP, and then, we also use ELK Stack to visualize the NetFlow log data. Third, we integrate the Wi-Fi log and NetFlow log data in one architecture using a distributed storage Ceph file system (CephFS). Moreover, we also compare the performance of RADOS Gateway and CephFS for better storage mechanism.
引用
收藏
页码:6344 / 6360
页数:17
相关论文
共 26 条
[1]   Cyber Threat Intelligence from Honeypot Data using Elasticsearch [J].
AL-Mohannadi, Hamad ;
Awan, Irfan ;
Al Hamar, Jassim ;
Cullen, Andrea ;
Disso, Jules Pagan ;
Armitage, Lorna .
PROCEEDINGS 2018 IEEE 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2018, :900-906
[2]   Design of a Dynamic Log Management Infrastructure Using Risk and Affiliation Network Analysis [J].
Anastopoulos, Vasileios ;
Katsikas, Sokratis .
22ND PAN-HELLENIC CONFERENCE ON INFORMATICS (PCI 2018), 2018, :52-57
[3]  
[Anonymous], 2018, ELASTICSEARCH GUIDAN
[4]  
[Anonymous], 2018, ELK Stack
[5]  
[Anonymous], 2018, NGINX INTRO
[6]  
[Anonymous], 2018, COMPLETE GUIDE ELK S
[7]  
Awad M, 2015, COMPUTER MEASUREMENT
[8]  
Bafumba Liseli J, 2018, IEEE INT CON AUTO SC, P1605, DOI 10.1109/COASE.2018.8560362
[9]  
Chuvakin A., 2012, Logging and log management: the authoritative guide to dealing with syslog, audit logs, events, alerts and other it 'noise'
[10]  
Gormley C., 2015, Elasticsearch: The Definitive Guide