On Tue, Oct 12, 2010 at 10:12 AM, Morris, Christopher <christopher.mor...@sabre-holdings.com> wrote: > I use SEC to monitor UNIX syslog messages on a central loghost server. > > > > When I started using SEC a single config file was sufficient. But as time > went on and number of rules grew it became clear that my single config file > was a maintenance problem. > > > > To make matters worse, I use a philosophy whereby I create a SEC rule for > every known message/issue -- and then any unknown message “falls through” > all the rules and is reported as an unknown event so that I can examine it > and of course make a new rule. (The reasoning behind this process is that I > don’t necessarily know what kinds of events I am looking for and I need to > be aware of new or unknown events. Our environment is highly dynamic and so > have to be able to adapt to changing conditions.) > > > > As you can guess -- besides a maintenance problem, there is also a > performance problem as each message may be examined by lots of rules. I’ve > mitigated this problem to some degree by creating sections in our > configuration file... There is a section at the top called ‘high-volume’ > that intercepts and handles events that are known to be voluminous in > nature. And then there’s a ‘temporary’ section to deal with short term or > unusual conditions. Finally, the remaining rules are ordered by the syslog > ‘tag’. I sometimes use SIGUSR1 to dump the rule-usage-frequency and may > will reorder the rules to reduce the load on the system and to improve > message processing. But of course this adds to the maintenance burden... > (BTW, our loghost is a Sun R240 system.) > > > > I’ve experimented with creating rules in separate config files - but this > has two problems from my perspective: One is that it doesn’t help the > problem of unnecessary examination of events by rules that don’t really > apply to that ruleset -- and (2) is that my ‘philosophy/strategy’ of using a > set of rules to filter out known events and reporting exceptions breaks down > when I use multiple config files... Or does it? > > > > I guess I’m asking if there are some ideas/suggestions for > rules/patters/strategies that I might be able to adopt to make our SEC > configuration better and to make management & maintenance easier given the > style and goals we have.
Why not have the centralized syslog server and the sec / alerting servers be separate? You could always split the streams up with rsyslog or syslog-ng and send them to different dedicated sec servers with fast network + cpu. If non-realtime is ok, you could split up the logs and post-process them using sec from other places as well. Are any of these ideas doable? -- Jeff Schroeder Don't drink and derive, alcohol and analysis don't mix. http://www.digitalprognosis.com ------------------------------------------------------------------------------ Beautiful is writing same markup. Internet Explorer 9 supports standards for HTML5, CSS3, SVG 1.1, ECMAScript5, and DOM L2 & L3. Spend less time writing and rewriting code and more time creating great experiences on the web. Be a part of the beta today. http://p.sf.net/sfu/beautyoftheweb _______________________________________________ Simple-evcorr-users mailing list Simple-evcorr-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/simple-evcorr-users