Leona
GitHubBlogs
  • Welcome to Leona!
  • Installation
    • Docker
    • Manual Setup
    • Log Collection
  • Tutorial
    • Quickstart
  • Configuration
    • Server Conf
    • Web Interface
    • Multi-Nodes
    • Index Model
    • Backup
    • The REST APIs
  • Security
    • Using ModSecurity
    • Logging User Activity
    • The URL Whitelist
    • Alerts And Events
  • Getting in
    • Log Sources
      • GELF
      • Beats
      • Ingest Logs Manually
        • Syslog
        • Journald
        • CEF
        • Raw or Plaintext
        • From Files
        • HTTP API
        • Application Data
      • Input
    • Sidecar
    • Forwarder
      • Forward Installation
      • Forward Configuration
  • Making sense
    • Pipelines
      • Rules
      • Functions
      • Use Cases
    • Streams
    • Enrichment
      • Lookup Tables
      • Geolocation
      • Data Adapters
  • Alerts & Notifications
    • Alerting By Example
    • Notifications
    • Leona Dashboard
  • Searching
    • Search Query Language
    • Time Frame Selector
  • Appendix
    • Support
    • License
    • Ecosystem
    • Contribute
    • Change Log
    • FAQs
Powered by GitBook
On this page
  • Choosing Log Event Sources
  • Collection Methods
  1. Installation

Log Collection

Log collection can be a daunting task, especially if massive amounts of data need to be collected. This process could be made easier by previously considering some key points.

Choosing Log Event Sources

The selection of event sources should be driven by the use cases that have been identified. For example, if the use case is the monitoring of user logins to critical resources, the event sources selected should be only those related to the critical resources in question. This may include the LDAP directory server, local servers, firewalls, network devices, and key applications.

There are many other potential event source categories, including:

  • Security

  • Firewalls

  • Endpoint Security (EDR, AV, etc.)

  • Web Proxies/Gateways

  • LDAP/Active Directory

  • IDS

  • DNS

  • DHCP

  • Servers

  • Workstations

  • Netflow

  • Ops

  • Applications

  • Network Devices

  • Servers

  • Packet Capture/Network Recorder

  • DNS

  • DHCP

  • Email

  • DevOps

  • Application Logs

  • Load Balancer Logs

  • Automation System Logs

  • Business Logic

Collection Methods

A decision must be made as to how the logs will be collected. After a list of event sources has been determined, the next step is to decide the method of collection for each source. It is critical to understand what method each event source uses and what resources may be required.

For example, if a log shipper will be required to read logs from a local file on all servers, the log shipper must be selected and tested before deployment. In other cases, proprietary APIs or software tools must be employed and integrated. In some cases, changes to the event sources themselves (security devices, network hardware, or applications) may be required. Additional planning is often required to deploy and maintain these collection methods over time.

PreviousManual SetupNextQuickstart

Last updated 2 years ago

Leona supports many input types out of the box and many more are available in .

LeonaLog Marketplace