The primary drivers for log management implementations are concerns about security,3 system and network operations (such as system or network administration) and regulatory compliance. Logs are generated by nearly every computing device, and can often be directed to different locations both on a local file system or remote system.
Effectively analyzing large volumes of diverse logs can pose many challenges, such as:
Users and potential users of log management may purchase complete commercial tools or build their own log-management and intelligence tools, assembling the functionality from various open-source components, or acquire (sub-)systems from commercial vendors. Log management is a complicated process and organizations often make mistakes while approaching it.4
Logging can produce technical information usable for the maintenance of applications or websites. It can serve:
Suggestions were made[by whom?] to change the definition of logging. This change would keep matters both purer and more easily maintainable:
One view of assessing the maturity of an organization in terms of the deployment of log-management tools might use[original research?] successive levels such as:
NIST SP 800-92r1, Cybersecurity Log Management Planning Guide https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-92r1.ipd.pdf ↩
Kent, Karen; Souppaya, Murugiah (September 2006). Guide to Computer Security Log Management (Report). NIST. doi:10.6028/NIST.SP.800-92. S2CID 221183642. NIST SP 800-92. /wiki/Doi_(identifier) ↩
"Leveraging Log Data for Better Security". EventTracker SIEM, IT Security, Compliance, Log Management. Archived from the original on 28 December 2014. Retrieved 12 August 2015. https://web.archive.org/web/20141228182418/http://www.prismmicrosys.com/newsletters_august2007.php ↩
"Top 5 Log Mistakes - Second Edition". Docstoc.com. Retrieved 12 August 2015. http://www.docstoc.com/docs/19680768/Top-5-Log-Mistakes---Second-Edition ↩