Syslog splunkงาน
Hello, I am looking for a keystroke logger that will log all keystrokes from users telneting or sshing into the AIX system as they are typed. The keystroke logger would be able to output to the syslog daemon. The primary shell used on our AIX 5.2/5.3 boxes is AIX's ksh (korn shell) We use a similar program on Redhat Linux called basha. It is a modified bash shell which does all of the above for bash. I am attaching the modified bash program just as an example for you. It is src in rpm format. Please let me know if this is possible, or if you have a better way of doing this. Thanks! ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Deliverables must be in ready-to-run condition, as f...
We would like to have a billing system for Cisco Call Manager Express. This application will collect all cdrs from the ccme via syslog and it will store them to MS SQL 2005 express. The application will be developed at c# and .net 2. This application will include the following functions. 1. Add ??" edit ??" view users (Name ??" department ??" phone number) 2. Add ??" edit ??" view new providers 3. Add Rates / provider via csv (area code, country, city, rate/sec, minimum charge) 4. Assign a prefix for each provider. 5. Add ??" edit ??" view ??" delete free numbers. 6. Add ??" edit ??" view ??" delete limits / department or /phone 7. Caller report (detail list of all calls from a specific caller for a specific time from to) 8...
we are looking for a system with syslog server, where we can add all several firewall messages/spam filter servers... important is that we must be able to add device easy to it in admin build page en create rule, so meaning example firewall HIGH alert RED, critical PURPLE (so color of lines and text changes) several devices will be connected , must be in nice html design style, so not pure flat text. user management where we can add users and decice which unit they can see...
we are looking for a system with syslog server, where we can add all several firewall messages/spam filter servers... important is that we must be able to add device easy to it in admin build page en create rule, so meaning example firewall HIGH alert RED, critical PURPLE (so color of lines and text changes) several devices will be connected , must be in nice html design style, so not pure flat text. user management where we can add users and decice which unit they can see...
**_Syslog Device Simulator Utility ??" Phase One_** The Syslog Device Simulator Utility (aka Injection Utility) will allow for the events in a syslog (RFC 3164) file to be sent to a particular device IP address across port 514. This utility can be used to simulate real syslog network traffic. The syslog file is a standard ASCII text file with syslog data embedded inside. See attached files for examples and further documentation ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Deliverables must be in ready-to-run condition, as follows (depending on the nature of the deliverables): a) For web sites or other server-side deliverables intended to only ever...
...new messages will need to be processed. · If the UMID is not “New?? then the message with the UMID indicated needs to be processed. · The message will be retrieved · The message will then have X- headers added to it · The message will be sent to a remote MTA via an SMTP connection · The message will be saved to disk within a specific directory structure · Syslog entries need to be generated for each activity and support for syslog OFF and 3 additional levels (normal, verbose and debug) must be provided. · SNMP support (optional - please quote in price, but can be delivered in a second phase) ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code...
...Monitoring Solution (Secondary Prority) Log File Analysis (Tiertary Prority) The tools should be relatively integrated and easy to use. Doesn't have to be a perfect solution. The solution must be able to handle multiple companies. Examples of software components: EasyCMDB, (Configuration Management) OneCMDB, (Configuration Management Database) Nagios, (Monitoring) Splunk (log file search engine) * Commercial Licenses is covered by byuer ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Deliverables must be in ready-to-run condition, as follows? (depending on the nature? of the deliverables): a)? For web sites or? other server-side deliverables intended to only ever
...understand the main idea and respond not only with a bid but with technical ideas that will cover and enrich the purpose of the device. The problem is that such ready sensors on the market sell for $500 to $800 (very expensive) while a linksys wireless access point costs $35-$50. I want to convert a wireless access point (linksys is the best choice) to behave as an RF sensor. The device will send syslog to an aggregation and correlation software (that I already have) that will run the rules and white lists etc.... The purpose is to know if there is a wireless activity in an office. Usually hackers can install a wireless device in an office and hook it to the network. Then they can sit outside in a car and probe the inner lan. The main demands I have are. 1. The device will detect...
...will search linux syslogs, sort output, and write output to a file on a Linux server. Should be small and simple to use. Example: I download said script to my server into my home directory. I want to be able to run said script with one of several pre-determined variables. (# scriptx -ipsi) script than looks for entries of the characters ipsi in the syslog chapters of /var/log/ecs for the last 10 days. Writes the output to a tmp file. The syslog output is not readable to my customers, so I then need the tmp file to be cleaned up into a readable a little bit and sorted into a final file with a date time stamp and hostname. Hopefully this is enough for you to at least get the drift of what I am looking for. I have no problem working with you on the details of this directly. ...
โปรดลงทะเบียน หรือเข้าสู่ระบบ เพื่อดูรายละเอียด
...no felonies or bankruptcy * Key Custodian form (when applicable). * Completion of User Access Form * Users should not be asked to accept these conditions more than once. All acceptances/rejections need to be saved for later review by the admin. * Password Wallet * Password listing for all servers. This will include both the admin and the user passwords for the production, backup, test, syslog and web server. * Passwords for PCAnywhere program for each server. * Passwords for VPN into the Access Server. Current status of the Password Wallet script can be viewed via the following URL. The selected programmer can simply add on to what I have currently or can use something else or even start over if it will be easier and/or be quicker in regards to the time in which to c...
...analayzer built that can filter data, then parse the results and reformat it and send it out via some form (for now just an SMB file (nt share) or syslog). I'm envisioning the following: 1) Data is sniffed & filtered via winpcap or similar driver (see for example of wrapper). 2) Data is dropped in some sort of queue 3) Protocol analysis is done and data is passed to another queue (MSMQ or simple array in ram?) 4) Business rules that do additional filtering then look for a pattern in the data 5) Based on the rule the data is reformated per input and spit back out to either a csv file on a share or a syslog feed (future feeds can be added easily via some plugin mechanism... future feeds may include JMS, TCP Stream, etc) And of course it needs
...Linux. Deliverables from coders are. Compile options for nagios and ndoutils used. mysql scripts used to create databases and tables. List of versions used of nagios, ndoutils and mysql. Working versions of config files for nagios and ndoutils. Any scripts that you have written to make this work. Currently i have nagios running on a Fedora Linux and recieving and logging data to syslog, I am loooking to change this to a database format. Below are links to the programs you will need. <> <> ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Deliverables must be in ready-to-run condition
... Messages show: Hi. This is the qmail-send program at ns05.untra.com. I'm afraid I wasn't able to deliver your message to the following addresses. This is a permanent error; I've given up. Sorry it didn't work out. : Sorry, I wasn't able to establish an SMTP connection. (#4.4.1) I'm not going to try again; this message has been in the queue too long. The syslog is showing many errors, all similar to the attached text. About 50 emails will make it into the box, *nothing* will happen for ten minutes, and then the cycle repeats. I have tried rebooting phl10, but this problem does not go away. I'd like a solution. One possible work-around would be to find out what is triggering the sleep/wakeup 10-minute c...
...sent to the channel. The configuration file allows setting of server(s) ports(s) file(s) to listen. The program also looks for messages in the channel that updates a filter configuration file. These messages will contain a regular expression that will then be appended to the filter configuration file. example: ^connect from syslog.* In the above example value="" reffers to the server, table and field. If a filter matches text from a file being watched it can launch an action. The actions it can launch are to send an e-mail with the message in it or to write the message to a table in a postgresql database. Here is a jabber module that should be used: ~reatmon/Net-Jabber-2
...mail from a system mail spool), searches for a particular substring in the body of that mail, and when it finds it, forwards that mail to RT with a suitably modified subject line. Bounced mail that does not contain the substring should not be forwarded, but should be archived in system standard incoming mail mailbox format. The script should log its actions (both forwarding and non-forwarding) via syslog. I anticipate the script will be running on the mail server that is receiving the bounces ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done including unit and functional tests. 2) Documentation (in FreeBSD man(1) format) describing program assumptions, invocation, options, environment...
We are looking for sales people to sell our networking software. Ideal people will have knowledge of networking tools like Routers, switches etc and an understanding of network protocols like SNMP, Syslog, SCP etc. Our product offers a scalable log & trap monitor for parsing Unix syslogs, router syslogs, firewall logs, SNMP traps, Windows events and logs from all other network elements. We already have sales with Fortune 100 companies, and are looking to expand customer base. We have brochures in electronic and paper format ready to be sent. This is a 100% commission based position. Please respond only if you have had experience in selling software and already have contacts in the industry.
A clone of this software is required with source code; built with vb 6 I have to integeratre this functionality in one of my college project. I Only need the TFTP Server & DHCP Server no SNTP/SYSLOG or TFTP Client are required, Additionally I require the DHCP server to be able to give static IP adresses to certain MAC numbers as user desired.... And I need it quick. TFTP server should support all the functionality of the quoted software i.e TFTPD32 the URL for the SOftware is <> the software is attached ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Deliverables must be in ready-to-run condition, as follows (depending on the nature of the deliverables):
A clone of this software is required with source code; built with vb 6 I have to integeratre this functionality in one of my college project. I Only need the TFTP Server & DHCP Server no SNTP/SYSLOG or TFTP Client are required, Additionally I require the DHCP server to be able to give static IP adresses to certain MAC numbers as user desired.... And I need it quick. TFTP server should support all the functionality of the quoted software i.e TFTPD32 the URL for the SOftware is <> the software is attached ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Deliverables must be in ready-to-run condition, as follows (depending on the nature of the deliverables):
I have a two day long syslog file (500 MB compressed ascii text file) for a campus wireless network. I need someone who can parse the syslog and do some analyses. The choice of programming/scripting language depends on you: Perl, C/C++, Awk/Sed (OS: Linux/Unix only). The requirement is that you know how to interpret the messages in the syslog (so you should have some system administration experience) and have some basic knowledge of 802.11b/g networks (such as what is a MAC address, AP, BSSID, ESSID, etc.). I need the following analysis to be done on the syslog: 1) Find the number of unique users. 2) Find session duration values over time. A session is started when a user logs into the network and a session ends when the user logs out or is booted out of the net...
...they should try again later. -Log the connection and action taken using the 'syslog' facility. Requirements: -This process must be fully automatic and transparent to the user. -BONUS: Inform the user which server they will be connected to before you connect them to that server. The information message must stay on the screen for 10 seconds and then the user should be automatically redirected. ## Deliverables ############################################################################################ Now for this project minimum of these skills are to be used : 1. X-client setup 2. system startup files 3. Shell scripting 4. xdm/kdm/gdm configuration (Preferably xdm) 5. chooser replacememnt 6. syslog 7. network utilities ############################...
You are required to develop an open source vulnerability assessment tool. The tool should be able to produce vulnerability trees according to an asset database and syslog files from the system (importing the syslog files into a database would be of help i suppose). You may use any open-source tools you want in order to accomplish this, as long as you end up with one application. Python is preferred, but anything else would do as well. Final application would ideally be cross platform, but if that's not fisible, you have the choice of going for windows or linux. For more details, any questions or suggestions, please don't hesitate to contact me. Project should be completed by September 28th at the latest.
**Want a Syslog Graphical Analyzer: ** I use the free **Kiwi Syslog Daemon ver. 7.2.27**, which captures the UDP network packets to port 514 (From a VPN device), displays them in that interface and saves to a text file. Need a way to easily analyze that data, either by your program reading the text file or by monitoring the port (replacing Kiwi). Need to group IP's, resolve IP to host names, have reports (filters). All of this isn't really neccessary and I'm open to discussion - just need a way to better visually analyze this information on the fly. _Must understand UDP syslog messages:_ Src (IP Address Source) Dst (IP Address Destination) SrcPort (Source Port) DstPort (Destination Port) NAT = It would be much better to have the abili...
...and Snort IDS. The firewall is custom designed with a unique path layout (APF), it uses policy based rules that are distributed into various files (i.e: etc...). All firewall logging is done to standard syslog kernel logs and in standard iptables format (with custom chain names). Snort IDS is a network intrusion detection system that sniffs packets and matches them against a set of signatures in order to identify a specific type of traffic. There-in such signature events are logged to a syslog style log. We are looking for is a web console that will correlate snort & firewall logs together into one unified console. The logs and events must be associated with eachother (i.e: matching source ip's etc...). Likewise the system MUST NOT require
We have a requirement for an in-depth tutorial on the fundamentals reviewing both the Windows & Linux Operating System Logs. The basics of the basics of reading the data from Windows Event Viewer, and Syslog should be covered as well as common log viewers on both Operating System platforms. This tutorial should be geared toward an IT professional audience with little or no exposure to the open in computer forensics. The article should be done in parts (part 1, part 2, part 3, etc), and must be at least 7 written pages in length. If we find several good candidates here on RAC we will continue to post these bid requests here, but we will also very seriously entertain the possibility of entering into an agreement with the writer for more tutorials of this type if we are pleased wit...
Our customers pay to have their Network devices and Servers monitored. We are looking for experts who can provide consultancy on further developing the product offerings into RMON, SNMP Trap collection and Syslog. You need to be able to communicate confidently with senior board level generalists on these issues. Please look at the pdf files on for more information on current offerings.
... subject, message, smtp server, smtp username, and smtp password, the system sends an email with the test information. Restart a Service - Using the specified computer name (<computer name> or UNC), service name, parameters, and optional username/password to connect as the system will restart the service. Log event to a Syslog - Using the specified server, port, message, severity level, and facility, the system will send the test information to the syslog server. ## Deliverables 1) Complete and fully-functional working program(s) in executable form as well as complete source code of all work done. 2) Installation package that will install the software (in ready-to-run condition) on the platform(s) specified in this bid request. 3) Complete ownership and ...
...qmail: 1044477955.180219 delivery 314: failure: Sorry,_no_mailbox_here_by_that_name._(#5.1.1)/ The program needs to look for Sorry,_I_wasn't_able_to_establish_an_SMTP_connection. and Sorry,_no_mailbox_here_by_that_name. Each one will have it's own message number like 304 & 314 above. These are spam. After it reads the Qmail mail-log file it can delete the contents. If the file it self is deleted syslog need to be sent a HUP. If you can get it to do a reverse lookup on the domain, would be a plus to be able to write a file with the IP address of these places. One file with the domain name. No host part of the domain. One file with the email address. When the domain name is written to the file I want it to be written as "at sign" with one domain per line. Th...
... ) for: 44274, 25 Jan 26 16:43:23 kingserv identd[15366]: Connection from Jan 26 16:43:23 kingserv identd[15366]: from: ( ) for: 45618, 110 The ID number 18713 & 12200 are spam. They are sending to unknown users and their mail is bouncing. After it reads the message file it can delete the contents. If the file it self is deleted syslog need to be sent a HUP. I want it to be able to write a file with the IP address of these places and a separate file with the domain name. No host part of the domain. When the domain name is written to the file I want it to be written as "at sign" with one domain per line. Then one final file that has both in it. These files will be updated many times a