blog.wireshark.org/2024/01/from-network-packets-to-log-data-how-logray-built-upon-falcos-foundation

Preview meta tags from the blog.wireshark.org website.

Linked Hostnames

4

Search Engine Appearance

Google

https://blog.wireshark.org/2024/01/from-network-packets-to-log-data-how-logray-built-upon-falcos-foundation

From Network Packets to Log Data: How Logray built upon Falco’s foundation | The Official Wireshark Blog

In the ever-evolving landscape of network security, a new star has emerged – Logray. The name comes from “log” (as in event logs) and “ray” (the closest zoological cousin to sharks, similar to “wire” and “shark” for network packets. Logray represents a significant leap in network security tools. Premiering at SharkFest ’22, it takes the best of Wireshark and innovates further by focusing on log data analysis. While Wireshark focuses on scrutinizing network traffic, Logray delves into system calls, Amazon Cloudtrail logs, and other log data, offering new vistas for network security professionals. At its core, Logray retains the user-friendly aspects of Wireshark, including the familiar filter engine, intuitive colouring, and context menus. Yet, it goes beyond by accommodating the reading of PcapNG files embedded with log data and facilitating the integration of third-party plugins using Falco’s powerful plugin API. System call and log data is saved using the PCAP Next Generation Dump File Format (pcapng), which provides a powerful and versatile shared foundation which broadens the scope of data capture and analysis. A notable innovation within Logray is ‘falcodump‘, a component enabling the dumping of log data via a Falco source plugin.



Bing

From Network Packets to Log Data: How Logray built upon Falco’s foundation | The Official Wireshark Blog

https://blog.wireshark.org/2024/01/from-network-packets-to-log-data-how-logray-built-upon-falcos-foundation

In the ever-evolving landscape of network security, a new star has emerged – Logray. The name comes from “log” (as in event logs) and “ray” (the closest zoological cousin to sharks, similar to “wire” and “shark” for network packets. Logray represents a significant leap in network security tools. Premiering at SharkFest ’22, it takes the best of Wireshark and innovates further by focusing on log data analysis. While Wireshark focuses on scrutinizing network traffic, Logray delves into system calls, Amazon Cloudtrail logs, and other log data, offering new vistas for network security professionals. At its core, Logray retains the user-friendly aspects of Wireshark, including the familiar filter engine, intuitive colouring, and context menus. Yet, it goes beyond by accommodating the reading of PcapNG files embedded with log data and facilitating the integration of third-party plugins using Falco’s powerful plugin API. System call and log data is saved using the PCAP Next Generation Dump File Format (pcapng), which provides a powerful and versatile shared foundation which broadens the scope of data capture and analysis. A notable innovation within Logray is ‘falcodump‘, a component enabling the dumping of log data via a Falco source plugin.



DuckDuckGo

https://blog.wireshark.org/2024/01/from-network-packets-to-log-data-how-logray-built-upon-falcos-foundation

From Network Packets to Log Data: How Logray built upon Falco’s foundation | The Official Wireshark Blog

In the ever-evolving landscape of network security, a new star has emerged – Logray. The name comes from “log” (as in event logs) and “ray” (the closest zoological cousin to sharks, similar to “wire” and “shark” for network packets. Logray represents a significant leap in network security tools. Premiering at SharkFest ’22, it takes the best of Wireshark and innovates further by focusing on log data analysis. While Wireshark focuses on scrutinizing network traffic, Logray delves into system calls, Amazon Cloudtrail logs, and other log data, offering new vistas for network security professionals. At its core, Logray retains the user-friendly aspects of Wireshark, including the familiar filter engine, intuitive colouring, and context menus. Yet, it goes beyond by accommodating the reading of PcapNG files embedded with log data and facilitating the integration of third-party plugins using Falco’s powerful plugin API. System call and log data is saved using the PCAP Next Generation Dump File Format (pcapng), which provides a powerful and versatile shared foundation which broadens the scope of data capture and analysis. A notable innovation within Logray is ‘falcodump‘, a component enabling the dumping of log data via a Falco source plugin.

  • General Meta Tags

    4
    • title
      From Network Packets to Log Data: How Logray built upon Falco’s foundation | The Official Wireshark Blog
    • charset
      utf-8
    • viewport
      width=device-width,minimum-scale=1
    • description
      In the ever-evolving landscape of network security, a new star has emerged – Logray. The name comes from “log” (as in event logs) and “ray” (the closest zoological cousin to sharks, similar to “wire” and “shark” for network packets. Logray represents a significant leap in network security tools. Premiering at SharkFest ’22, it takes the best of Wireshark and innovates further by focusing on log data analysis. While Wireshark focuses on scrutinizing network traffic, Logray delves into system calls, Amazon Cloudtrail logs, and other log data, offering new vistas for network security professionals. At its core, Logray retains the user-friendly aspects of Wireshark, including the familiar filter engine, intuitive colouring, and context menus. Yet, it goes beyond by accommodating the reading of PcapNG files embedded with log data and facilitating the integration of third-party plugins using Falco’s powerful plugin API. System call and log data is saved using the PCAP Next Generation Dump File Format (pcapng), which provides a powerful and versatile shared foundation which broadens the scope of data capture and analysis. A notable innovation within Logray is ‘falcodump‘, a component enabling the dumping of log data via a Falco source plugin.
  • Open Graph Meta Tags

    4
    • og:type
      article
    • og:title
      From Network Packets to Log Data: How Logray built upon Falco’s foundation | The Official Wireshark Blog
    • og:url
      https://blog.wireshark.org/2024/01/from-network-packets-to-log-data-how-logray-built-upon-falcos-foundation/
    • og:description
      In the ever-evolving landscape of network security, a new star has emerged – Logray. The name comes from “log” (as in event logs) and “ray” (the closest zoological cousin to sharks, similar to “wire” and “shark” for network packets. Logray represents a significant leap in network security tools. Premiering at SharkFest ’22, it takes the best of Wireshark and innovates further by focusing on log data analysis. While Wireshark focuses on scrutinizing network traffic, Logray delves into system calls, Amazon Cloudtrail logs, and other log data, offering new vistas for network security professionals. At its core, Logray retains the user-friendly aspects of Wireshark, including the familiar filter engine, intuitive colouring, and context menus. Yet, it goes beyond by accommodating the reading of PcapNG files embedded with log data and facilitating the integration of third-party plugins using Falco’s powerful plugin API. System call and log data is saved using the PCAP Next Generation Dump File Format (pcapng), which provides a powerful and versatile shared foundation which broadens the scope of data capture and analysis. A notable innovation within Logray is ‘falcodump‘, a component enabling the dumping of log data via a Falco source plugin.
  • Link Tags

    5
    • canonical
      https://blog.wireshark.org/2024/01/from-network-packets-to-log-data-how-logray-built-upon-falcos-foundation/
    • shortcut icon
      /favicon.ico
    • stylesheet
      /lib/icofont/icofont.min.css
    • stylesheet
      /css/syntax.css
    • stylesheet
      /css/style.css

Links

92