Troubleshooting and Tool Report – Nursing Writings

Troubleshooting and Tool Report – Nursing Writings

1

Troubleshooting and Tool Recommendation:SITREP Sample Report

Problem:

Each of the networked 15 servers and 400 hosts are generating logs. Some of these logsare likely due to security issues. We only have 10 network security workers, and theydon’t have the time to review each log that is generated across the network. This is aproblem because the logs can identify security issues, host events, network optimizationchallenges, and errors. We need an automated method to collect, centrally store, andanalyze the logs, only generating an alert when human intervention is needed.

Troubleshooting Steps:

[List the networking troubleshooting methodology]

Tool and Description:

To solve the problem identified, it is proposed that [Logstash] be implemented within thenetwork. Logstash (a fictional tool) is a free and open server-side data processingpipeline that ingests data from varying sources, transforms it, and display the results.This tool allows for the collection of logs from virtually any source to include hosts,network devices, and servers. Most logs are in the format of their creator and thereforeare not standardized across a network of systems. Logstash normalizes the logs byconverting them into key fields and elements that are most important to networksecurity and optimization. This allows users to program alerts on the Logstash server andautomatically be alerted to only the most important log alerts. Logstash provides theability to save time and human capital resources while ensuring network security andoptimization capability.

2

Tool Operational Use Case:

Logstash is being employed in our network to solve the log analysis problem identifiedabove. Once implemented and properly configured, we expect Logstash to allow us tocomply with internal security policies and outside regulations and audits, understand andrespond to data breachers and other security incidents, troubleshoot systems, computer,and network devices, understand user behaviors, and conduct forensics in the event ofan investigation. The deployment of Logstash will also save us valuable time andresources given we only have 10 personnel. The log alerts will enable network supportpersonnel to respond only to the most crucial alerts, while ensuring nothing of criticalimportance is not known.

Tool Functionality:

Once installed on the server and Linux operating system, the command functionalityincludes multiple options:

• Logstash start (this command starts the Logstash service)

• Logstash –f (this command identifies the log file location)

• Logstash –in (this command ingests the log files)

• Logstash –c (this command sets the number of files to ingest before stopping)

• Logstash –cs (this command sets the ingest to continuous)

• Logstash –a (this command sets the parameters to analyze and alert)

3

Example Screenshot of the Windows Command Prompt

Troubleshooting and Tool Recommendation: SITREP Sample Report

Problem:
Troubleshooting Steps:
Tool and Description:

Tool Operational Use Case:
Tool Functionality:

Like this:Like Loading…

"You need a similar assignment done from scratch? Our qualified writers will help you with a guaranteed AI-free & plagiarism-free A+ quality paper, Confidentiality, Timely delivery & Livechat/phone Support.


Discount Code: CIPD30



Click ORDER NOW..

order custom paper