blog.wireshark.org/2024/01/from-network-packets-to-log-data-how-logray-built-upon-falcos-foundation
Preview meta tags from the blog.wireshark.org website.
Linked Hostnames
4- 88 links toblog.wireshark.org
- 2 links towww.wireshark.org
- 1 link towiki.wireshark.org
- 1 link towww.youtube.com
Search Engine Appearance
From Network Packets to Log Data: How Logray built upon Falco’s foundation | The Official Wireshark Blog
In the ever-evolving landscape of network security, a new star has emerged – Logray. The name comes from “log” (as in event logs) and “ray” (the closest zoological cousin to sharks, similar to “wire” and “shark” for network packets. Logray represents a significant leap in network security tools. Premiering at SharkFest ’22, it takes the best of Wireshark and innovates further by focusing on log data analysis. While Wireshark focuses on scrutinizing network traffic, Logray delves into system calls, Amazon Cloudtrail logs, and other log data, offering new vistas for network security professionals. At its core, Logray retains the user-friendly aspects of Wireshark, including the familiar filter engine, intuitive colouring, and context menus. Yet, it goes beyond by accommodating the reading of PcapNG files embedded with log data and facilitating the integration of third-party plugins using Falco’s powerful plugin API. System call and log data is saved using the PCAP Next Generation Dump File Format (pcapng), which provides a powerful and versatile shared foundation which broadens the scope of data capture and analysis. A notable innovation within Logray is ‘falcodump‘, a component enabling the dumping of log data via a Falco source plugin.
Bing
From Network Packets to Log Data: How Logray built upon Falco’s foundation | The Official Wireshark Blog
In the ever-evolving landscape of network security, a new star has emerged – Logray. The name comes from “log” (as in event logs) and “ray” (the closest zoological cousin to sharks, similar to “wire” and “shark” for network packets. Logray represents a significant leap in network security tools. Premiering at SharkFest ’22, it takes the best of Wireshark and innovates further by focusing on log data analysis. While Wireshark focuses on scrutinizing network traffic, Logray delves into system calls, Amazon Cloudtrail logs, and other log data, offering new vistas for network security professionals. At its core, Logray retains the user-friendly aspects of Wireshark, including the familiar filter engine, intuitive colouring, and context menus. Yet, it goes beyond by accommodating the reading of PcapNG files embedded with log data and facilitating the integration of third-party plugins using Falco’s powerful plugin API. System call and log data is saved using the PCAP Next Generation Dump File Format (pcapng), which provides a powerful and versatile shared foundation which broadens the scope of data capture and analysis. A notable innovation within Logray is ‘falcodump‘, a component enabling the dumping of log data via a Falco source plugin.
DuckDuckGo
From Network Packets to Log Data: How Logray built upon Falco’s foundation | The Official Wireshark Blog
In the ever-evolving landscape of network security, a new star has emerged – Logray. The name comes from “log” (as in event logs) and “ray” (the closest zoological cousin to sharks, similar to “wire” and “shark” for network packets. Logray represents a significant leap in network security tools. Premiering at SharkFest ’22, it takes the best of Wireshark and innovates further by focusing on log data analysis. While Wireshark focuses on scrutinizing network traffic, Logray delves into system calls, Amazon Cloudtrail logs, and other log data, offering new vistas for network security professionals. At its core, Logray retains the user-friendly aspects of Wireshark, including the familiar filter engine, intuitive colouring, and context menus. Yet, it goes beyond by accommodating the reading of PcapNG files embedded with log data and facilitating the integration of third-party plugins using Falco’s powerful plugin API. System call and log data is saved using the PCAP Next Generation Dump File Format (pcapng), which provides a powerful and versatile shared foundation which broadens the scope of data capture and analysis. A notable innovation within Logray is ‘falcodump‘, a component enabling the dumping of log data via a Falco source plugin.
General Meta Tags
4- titleFrom Network Packets to Log Data: How Logray built upon Falco’s foundation | The Official Wireshark Blog
- charsetutf-8
- viewportwidth=device-width,minimum-scale=1
- descriptionIn the ever-evolving landscape of network security, a new star has emerged – Logray. The name comes from “log” (as in event logs) and “ray” (the closest zoological cousin to sharks, similar to “wire” and “shark” for network packets. Logray represents a significant leap in network security tools. Premiering at SharkFest ’22, it takes the best of Wireshark and innovates further by focusing on log data analysis. While Wireshark focuses on scrutinizing network traffic, Logray delves into system calls, Amazon Cloudtrail logs, and other log data, offering new vistas for network security professionals. At its core, Logray retains the user-friendly aspects of Wireshark, including the familiar filter engine, intuitive colouring, and context menus. Yet, it goes beyond by accommodating the reading of PcapNG files embedded with log data and facilitating the integration of third-party plugins using Falco’s powerful plugin API. System call and log data is saved using the PCAP Next Generation Dump File Format (pcapng), which provides a powerful and versatile shared foundation which broadens the scope of data capture and analysis. A notable innovation within Logray is ‘falcodump‘, a component enabling the dumping of log data via a Falco source plugin.
Open Graph Meta Tags
4- og:typearticle
- og:titleFrom Network Packets to Log Data: How Logray built upon Falco’s foundation | The Official Wireshark Blog
- og:urlhttps://blog.wireshark.org/2024/01/from-network-packets-to-log-data-how-logray-built-upon-falcos-foundation/
- og:descriptionIn the ever-evolving landscape of network security, a new star has emerged – Logray. The name comes from “log” (as in event logs) and “ray” (the closest zoological cousin to sharks, similar to “wire” and “shark” for network packets. Logray represents a significant leap in network security tools. Premiering at SharkFest ’22, it takes the best of Wireshark and innovates further by focusing on log data analysis. While Wireshark focuses on scrutinizing network traffic, Logray delves into system calls, Amazon Cloudtrail logs, and other log data, offering new vistas for network security professionals. At its core, Logray retains the user-friendly aspects of Wireshark, including the familiar filter engine, intuitive colouring, and context menus. Yet, it goes beyond by accommodating the reading of PcapNG files embedded with log data and facilitating the integration of third-party plugins using Falco’s powerful plugin API. System call and log data is saved using the PCAP Next Generation Dump File Format (pcapng), which provides a powerful and versatile shared foundation which broadens the scope of data capture and analysis. A notable innovation within Logray is ‘falcodump‘, a component enabling the dumping of log data via a Falco source plugin.
Link Tags
5- canonicalhttps://blog.wireshark.org/2024/01/from-network-packets-to-log-data-how-logray-built-upon-falcos-foundation/
- shortcut icon/favicon.ico
- stylesheet/lib/icofont/icofont.min.css
- stylesheet/css/syntax.css
- stylesheet/css/style.css
Links
92- https://blog.wireshark.org
- https://blog.wireshark.org/2023/07/wireshark-is-25
- https://blog.wireshark.org/2023/09/the-evolution-of-system-introspection-from-bpf-to-wireshark-to-falco
- https://blog.wireshark.org/2024/01/from-network-packets-to-log-data-how-logray-built-upon-falcos-foundation
- https://blog.wireshark.org/2024/08/whats-new-in-wireshark-4-4