Professional Documents
Culture Documents
Related Literature
talent, and interests of the students, and that are relevant to local, national, and
and type of education unit has its unique function relevant to the development of
occurring events. Logs can be useful information to monitor network devices. The
that can receive, manage, and analyze logs. This research identifies the
functional requirements of the log management system. DSR Method was used
to design the topology and software of the log management system. The next
step is the implementation of the topology, software, and application. The last
confidence in the system. Audit logs are used for this purpose to monitor the
logs, they can modify, delete, and even destroy them. Securing these logs
expensiveness, missing semantics, and are not verifiable. Various schemes have
been proposed for this purpose, but a standard method is required to structure
According to Abreu and Almada (2020), logs are a crucial piece of any
system and give a helpful insight into what it is doing as well as what happened
format. Generally, these logs are written to local storage resources. As systems
progress, there was the need of having a standardized log format, minimizing
programs, each having its logging system. Log entries generated by different
correlate them across several requests. This is a tiresome process and if the
(https://rb.gy/6efkmw)
Related Studies
(SCMS) stated that Education is the key to unlocking the golden door of freedom.
After parents, this is a teacher who guides children on the path to success. At
this current age of education in most places, Bangladesh is felled behind in many
teachers and parents. SCMS will help to smoother and make it more effective by
(https://rb.gy/mb4gbo)
Management System” that is essential for the network administrator. With a log
management tool, we can collect, store, analyze, archive, and finally dispose of
the log information. In this paper, we propose the architecture model of a log
management system using ELK Stack with Ceph to provide a safe network, good
Wi-Fi signal strength, and adequate backup data mechanism. In this case, we
use our campus data of Wi-Fi log and NetFlow log. First, we collect and store
data of our Wi-Fi log using the Filebeats tool, and then, we use Elasticsearch,
Logstash, and Kibana Stack to visualize the Wi-Fi log data. Second, we collect
and store our NetFlow log using NFDUMP, and then, we also use ELK Stack to
visualize the NetFlow log data. Third, we integrate the Wi-Fi log and NetFlow log
data in one architecture using a distributed storage Ceph file system (CephFS).