We trust in security


We trust in security - Blog

Categoría ELK

Pau Rodríguez
ELK on a Raspberry Pi

Syslog inspection Installing ELK stack on a Raspberry Pi 3 Analysis of the logs with Kibana Looking at threat reports Conclusion 1. Syslog inspection Internet is full of bad guys that are constantly scanning all IP addresses looking for unpatched services, misconfigured servers, or simply gathering information from new targets. Most of those Internet scans are usually done by automated software, some of them are worms looking to spread.