Instructions


Fill out this sheet as you progress through the lab and discussions. Hold your worksheets until the end to turn them in as a final submission packet.

Downloads

The worksheet has been provided below. The document(s) can be transposed to the desired format so long as the content is preserved. For example, the .txt could be transposed to a .md file.

Unit 6 Recording

Discussion Post #1

Review chapter 15 of the SRE book: https://google.github.io/building-secure-and-reliable-systems/raw/ch15.html#collect_appropriate_and_useful_logs. There are 14 references at the end of the chapter. Follow them for more information. One of them: https://jvns.ca/blog/2019/06/23/a-few-debugging-resources/ should be reviewed for question "c".

  • a. What are some concepts that are new to you?
  • b. There are 5 conclusions drawn, do you agree with them? Would you add or remove anything from the list?
  • c. In Julia Evan's debugging blog, which shows that debugging is just another form of troubleshooting, what useful things do you learn about the relationship between these topics? Are there any techniques you already do that this helps solidify for you?

Discussion Post #2

Read https://sre.google/sre-book/monitoring-distributed-systems/.

  • What interesting or new things do you learn in this reading? What may you want to know more about?
  • What are the "4 golden signals"?
  • After reading these, why is immutability so important to logging? What do you think the other required items are for logging to be effective?
Submit your input by following the link below.

The discussion posts are done in Discord threads. Click the 'Threads' icon on the top right and search for the discussion post.

Definitions


Types of logs

  • Application
  • Host
  • Network
  • DB

Immutable

Structure of Logs

  • RFC 3164 BSD Syslog
  • RFC 5424 IETF Syslog
  • Systemd Journal

Log rotation

Rsyslog

Log aggregation

  • ELK
  • Splunk
  • Graylog
  • Loki

SIEM

Digging Deeper


  1. Find a cloud service and see what their logging best practices are for security incident response. Here is AWS: https://aws.amazon.com/blogs/security/logging-strategies-for-security-incident-response/

    • What are the high level concepts mentioned?
    • What are the tools available and what actions do they take?
    • What are the manual and automated query capabilities provided, and how they help you rapidly get to a correct assessment of the logged events?
  2. Open up that STIG Viewer and filter by "logging" for any of the previous STIGs we've worked on. (Mariadb has some really good ones.)

    • What seems to be a common theme?
    • What types of activities MUST be logged in various applications and operating systems?
      • Does it make sense why all logins are tracked?
      • Does it make sense why all admin actions, even just attempted admin actions, are logged?

Reflection Questions


  1. What architectures have you used in your career?

    • If you haven't yet worked with any of these, what do you think you would architect in the ProLUG lab (~60 virtual machines, 4 physical machines, 1 NFS share, and 2 Windows laptops?)
  2. What questions do you still have about this week?

  3. How are you going to use what you've learned in your current role?