Skip to Content
Securing DevOps
book

Securing DevOps

by Julien Vehent
August 2018
Intermediate to advanced
384 pages
12h 18m
English
Manning Publications
Content preview from Securing DevOps

8 Analyzing logs for fraud and attacks

This chapter covers

  • Examining the components of a logging pipeline’s analysis layer
  • Detecting fraud and attacks using string signatures, statistics, and historical data
  • Managing techniques for alerting users without overwhelming them

In chapter 7, you learned how to build a logging pipeline to collect, stream, analyze, store, and access logs across the infrastructure. A multilayered pipeline creates a flexible infrastructure where logs from different origins are used to monitor the activity of the organization’s services. Chapter 7 gave an overview of the functionalities provided by each layer of the pipeline. In this chapter, we’ll focus on the third layer, the analysis layer, and dive into techniques ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Hands-On Security in DevOps

Hands-On Security in DevOps

Tony Hsiang-Chih Hsu
Kubernetes Security

Kubernetes Security

Liz Rice, Michael Hausenblas

Publisher Resources

ISBN: 9781617294136Supplemental ContentPublisher SupportOtherPublisher WebsiteErrata PagePurchase Link