Query, explore, interpret, and share log data in real time to expedite your decision-making process with the log management solution.
Overview
Radiant Security's latest Log Management feature lets you perform codeless queries to detect the source of problems in your systems, make decisions backed by data, and resolve problems exponentially faster.
Key Benefits
We've tailored the Log Management feature to help you:
- Accelerate incident response: With a powerful querying platform and an interactive events timeline, your team can efficiently run tailored queries to identify and respond to issues before they escalate them.
- Enhance data visibility: With customizable date ranges, extracted fields, and intuitive data visualizations, you get a full, uninterrupted view of your logs.
What can I do with Radiant Security's Log Management?
The following table lists all capabilities available to customers who are using Radiant Security's Log Manager.
Log data formats
Log data can be generated in two formats: JSON and Fields.
- JSON - One of the most popular structured log formats using key-value pairs, JSON offers more compact and efficient data storage than XML, making it more machine-friendly.
- Fields - The structured Fields view allows you to conduct in-depth analysis of individual events and copy specific row information with a single click, quickening your investigation.
Set Up Log Management
Refer to this article to set up the Log Management feature.
Configure Log Management sources
Once you finish configuring your storage, you can move on and add the log connectors you want to manage. Here's how to do it:
- From the navigation menu, select Settings > Data Connectors.
- Click + Add Connector.
- From the list of connectors, select all the trusted sources you want. AWS, Palo Alto, CrowdStrike, Mimecast, and others are available in our system. This step ensures that all of your log data is available for analysis.
- For each, follow the onboarding instructions in our Knowledge Base.
Start querying your logs
Once your connectors are in place, go to the Log Management tab. Enter your search criteria in the query field, apply any necessary filters, and choose the appropriate date range. Results will display in real time, providing a snapshot of your logs.
We value your opinion. Did you find this article helpful? Share your thoughts by clicking here or reach to our Product and Customer Success teams at support@radiantsecurity.ai
Last updated: 2024-12-27