Introducing the Log Management Feature

Query, explore, interpret, and share log data in real time to expedite your decision-making process with the log management solution.

Overview

Radiant Security's latest Log Management feature lets you perform codeless queries to detect the source of problems in your systems, make decisions backed by data, and resolve problems exponentially faster. Screenshot 2024-11-01 at 11.29.05 AM

Key Benefits

We've tailored the Log Management feature to help you:

  • Accelerate incident response: With a powerful querying platform and an interactive events timeline, your team can efficiently run tailored queries to identify and respond to issues before they escalate them.
  • Enhance data visibility: With customizable date ranges, extracted fields, and intuitive data visualizations, you get a full, uninterrupted view of your logs.

What can I do with Radiant Security's Log Management?

The following table lists all capabilities available to customers who are using Radiant Security's Log Manager.

Screenshot 2024-12-26 at 10.56.15 AM

# Name Description
1 Timeline Visualize events over time with a customizable timeline. The feature supports preset ranges (like the last 7 or 30 days) and custom ranges, making it easy to track trends, anomalies, or peaks in activity.
2 Query Run searches to find insightful information such as IP addresses, host names, or device identifiers to get context around events and gauge the potential impact on internal systems.
3 Query history Access a record of your previous queries for easy reference and reuse.
4 Event views Inspect each event in the log format that best suits your team: JSON or Fields view.
5 Extracted Fields Access metrics about the extracted fields such as top and rare values, min and max occurrences over time.

Log data formats

Log data can be generated in two formats: JSON and Fields.

  • JSON - One of the most popular structured log formats using key-value pairs, JSON offers more compact and efficient data storage than XML, making it more machine-friendly.
  • Fields - The structured Fields view allows you to conduct in-depth analysis of individual events and copy specific row information with a single click, quickening your investigation.Screen Recording 2024-11-01 at 11.35.27 AM

Set Up Log Management

Refer to this article to set up the Log Management feature.

Configure Log Management sources

Once you finish configuring your storage, you can move on and add the log connectors you want to manage. Here's how to do it:

  1. From the navigation menu, select Settings > Data Connectors.
  2. Click + Add Connector.
  3. From the list of connectors, select all the trusted sources you want. AWS, Palo Alto, CrowdStrike, Mimecast, and others are available in our system. This step ensures that all of your log data is available for analysis.
  4. For each, follow the onboarding instructions in our Knowledge Base.

Start querying your logs

Once your connectors are in place, go to the Log Management tab. Enter your search criteria in the query field, apply any necessary filters, and choose the appropriate date range. Results will display in real time, providing a snapshot of your logs.


We value your opinion. Did you find this article helpful? Share your thoughts by clicking here or reach to our Product and Customer Success teams at support@radiantsecurity.ai

 

Last updated: 2024-12-27