On Tue, 12 Oct 2010, Morris, Christopher wrote:

I use SEC to monitor UNIX syslog messages on a central loghost server.

When I started using SEC a single config file was sufficient.  But as time went 
on and number of rules grew it became clear that my single config file was a 
maintenance problem.

To make matters worse, I use a philosophy whereby I create a SEC rule for every known 
message/issue -- and then any unknown message "falls through" all the rules and 
is reported as an unknown event so that I can examine it and of course make a new rule.  
(The reasoning behind this process is that I don't necessarily know what kinds of events 
I am looking for and I need to be aware of new or unknown events.  Our environment is 
highly dynamic and so have to be able to adapt to changing conditions.)

I do the same thing, but instead of generating the resulting 'unknown' messages in real time, I do it as a nightly report (my log volume is high enough that doing it in real time would kill me when a new app started spewing logs)

As you can guess -- besides a maintenance problem, there is also a performance 
problem as each message may be examined by lots of rules.  I've mitigated this 
problem to some degree by creating sections in our configuration file...  There 
is a section at the top called 'high-volume' that intercepts and handles events 
that are known to be voluminous in nature.  And then there's a 'temporary' 
section to deal with short term or unusual conditions.  Finally, the remaining 
rules are ordered by the syslog 'tag'.  I sometimes use SIGUSR1 to dump the 
rule-usage-frequency and may will reorder the rules to reduce the load on the 
system and to improve message processing.  But of course this adds to the 
maintenance burden...  (BTW, our loghost is a Sun R240 system.)

I've experimented with creating rules in separate config files - but this has 
two problems from my perspective:  One is that it doesn't help the problem of 
unnecessary examination of events by rules that don't really apply to that 
ruleset -- and (2) is that my 'philosophy/strategy' of using a set of rules to 
filter out known events and reporting exceptions breaks down when I use 
multiple config files...  Or does it?

I guess I'm asking if there are some ideas/suggestions for rules/patters/strategies 
that I might be able to adopt to make our SEC configuration better and to make 
management & maintenance easier given the style and goals we have.

if you put the rules in multiple files, group them by something and then have the first rule in the file be to match that something, otherwise skip checking all other rules in that file

has anyone thought about making a variation of SEC that could compile the rule matches down to a parse tree instead of doing a series of regex matches? at low traffic volumes it doesn't matter, but for high traffic volumes and large numbers of rules (like Christopher has) it could make a huge difference.

David Lang
------------------------------------------------------------------------------

Beautiful is writing same markup. Internet Explorer 9 supports

standards for HTML5, CSS3, SVG 1.1,  ECMAScript5, and DOM L2 & L3.

Spend less time writing and  rewriting code and more time creating great

experiences on the web. Be a part of the beta today.

http://p.sf.net/sfu/beautyoftheweb
_______________________________________________

Simple-evcorr-users mailing list

Simple-evcorr-users@lists.sourceforge.net

https://lists.sourceforge.net/lists/listinfo/simple-evcorr-users

------------------------------------------------------------------------------
Beautiful is writing same markup. Internet Explorer 9 supports
standards for HTML5, CSS3, SVG 1.1,  ECMAScript5, and DOM L2 & L3.
Spend less time writing and  rewriting code and more time creating great
experiences on the web. Be a part of the beta today.
http://p.sf.net/sfu/beautyoftheweb
_______________________________________________
Simple-evcorr-users mailing list
Simple-evcorr-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/simple-evcorr-users

Reply via email to