يحاول ذهب - حر

Evolution of Log Analysis Architectures

August 2024

|

Open Source For You

Going down memory lane, it's easy to see how changing needs have helped evolve log analysers since the mid-2000s. What worked then, will not work today. But the journey is to be cherished.

- Krishna Mohan Koyya

Evolution of Log Analysis Architectures

It was the late nineties, and I had about 3-4 years of development experience by then. I had just transitioned from the GSM field to the world of network management systems (NMS) after joining a multinational company in Bengaluru. Although my master’s degree was in computer networks, NMS was entirely new to me. I was familiar with hubs, routers, switches, IP addresses, RFCs, and protocols, but only in theory. This was the first time I had hands-on experience with NMS.

From a technological standpoint, I was quite proficient. I coded in C++ and worked on HP-UX, a variant of UNIX. I had experience with large-scale, mission-critical systems. In a way, I was filled with youthful confidence when I began working with NMS.

In my new role, I was assigned the task of enhancing a log analysis tool as part of a larger NMS. NMS are structured around the FCAPS model, which stands for fault management, configuration management, accounting, performance, and security. This model is defined by ISO. The log analysis tool our team was developing fell under the fault management category. Figure 1 captures the arrangement.

imageThe requirement was straightforward: the log analysis tool needed to gather system logs from all devices across the network, store them in a database, analyse them, and take necessary actions.

This NMS was intended for use by large service providers. In the US market, the adoption of GSM mobile phones was slower compared to VoIP (Voice over IP). While mobile telephony was just beginning in India, offices were transitioning from PSTN technology to VoIP, and VoIP phones were becoming commonplace on every employee’s desk. Each time a call was made or received, or a VoIP phone was powered on or off, a system log was generated. Our log analysis tool needed to collect and analyse all these logs.

المزيد من القصص من Open Source For You

Open Source For You

Open Source For You

The Role of Open Source in Building Modern Data Infrastructure

It's no secret that open source is emerging as the backbone of modern data infrastructure. Here’s a list of the core open source technologies used to deploy this infrastructure, along with some real-world examples and a brief on why open source matters.

time to read

3 mins

December 2025

Open Source For You

Open Source For You

The Whispering Machines: How Open Source is Bringing Intelligence to the Tiniest Devices

Built on open source frameworks, TinyML is enabling complex machine learning models to run on the microcontrollers embedded in connected devices, bringing artificial intelligence to the very edge of the network.

time to read

3 mins

December 2025

Open Source For You

Open Source For You

Setting Up Snort to Secure Your Network

Snort is a popular, open source intrusion detection system that monitors traffic in real time to detect malware. Here’s a detailed explanation of how to set it up on Ubuntu and test it by generating traffic from another system.

time to read

7 mins

December 2025

Open Source For You

Open Source For You

When AI Meets DevOps to Build Self-Healing Systems

Traditional DevOps, with its rule-based automation, is struggling to work effectively in today’s complex tech world. But when combined with AlOps, it can lead to IT systems that predict failures and solve issues without human intervention.

time to read

7 mins

December 2025

Open Source For You

Open Source For You

How to Automate Java Code Modernisation

This short guide illustrates that automating Java code modernisation with Python and OpenAI API is not just possible-it's remarkably effective.

time to read

5 mins

December 2025

Open Source For You

Open Source For You

The Quest to Build a Quantum Computer

The road to large-scale quantum computing is long and hard, with incremental advances paving the way. But the destination is in sight.

time to read

12 mins

December 2025

Open Source For You

Open Source For You

Job Opportunities: What's Hot in the Cloud Space?

If there's one field that refuses to slow down, it's cloud computing. Even as automation and AI reshape roles, cloud adoption continues to surge. From startups deploying microservices overnight to enterprises migrating decades of legacy systems, cloud remains the engine of digital transformation. For professionals, this means one thing: skills that live in the cloud won't come down anytime soon.

time to read

2 mins

December 2025

Open Source For You

Open Source For You

Securing Client Identity with Post-Quantum Cryptography

Here's a quick tutorial on how to build a secure, real world client-server model that establishes client identity by using CRYSTALS-Dilithium, a post-quantum cryptography algorithm.

time to read

3 mins

December 2025

Open Source For You

Open Source For You

Unlocking the Power of Multi-Agent Solutions with the Microsoft Agentic Framework

The Microsoft Agentic Framework is rapidly emerging as a cornerstone for developers, architects, and technology leaders seeking to build dynamic, intelligent systems powered by multiple collaborating agents. In an era where automation, distributed intelligence, and adaptive software are increasingly vital, this framework offers robust tools and features to accelerate the design and deployment of agent-based solutions.

time to read

6 mins

December 2025

Open Source For You

Open Source For You

Apache Iceberg and Trino: Powering Data Lakehouse Architecture

Apache Iceberg is a cornerstone of any open data lakehouse, providing the transactional foundation upon which highly scalable and flexible analytics can flourish. Along with Trino, it can be used to build a robust, scalable, and high-performance data lakehouse.

time to read

4 mins

December 2025

Listen

Translate

Share

-
+

Change font size