This site has been retired. For up to date information, see handbook.gnome.org or gitlab.gnome.org.


[Home] [TitleIndex] [WordIndex

Log Viewer Proposal

Status

Introduction

The aims of this specification include creating a modular log file aggregating framework to allow all types of logs to be aggregated in all types of ways.

Rationale

The current gnome-system-log application looks very nice; but there are directions it's just not feasible to go without major mutually exclusive or cumbersom changes. These include types of data to log, methods for logging, and methods of display.

Scope and Use Cases

The use of a system log viewer or real-time system activity tracker should be to easily review logs and track system activity in real-time. This may not simply apply to syslog and kernlog; but, for example, may be desirable for monitoring the snort IDS or all network activity through libpcap in the vein of Ethereal.

Furthery, it may be desired to take the display of this data in new and interesting directions. Typically, output is in the form of a list of logging data which administrators and auditors have to sift through to find anomolies; however, we may want to add more ways to analyze the data, either on screen or in other ways. Interesting examples include:

These examples are all out of scope for core GNOME developers; but they are very interesting. Additionally, GNOME developers cannot predict every possible system event that can be logged; consider Oracle 9i database logs or other proprietary information logging. Because of these factors, our scope would involve a modular logging system with the following components:

INTERESTING NOTES THAT NEED TO BE MOVED ELSEWHERE ON THIS PAGE

It is important to note here that the Analysis plug-ins deal with data from Data plug-ins; but we do not specify this data for the program. Analysis occurs based on data patters. For example:

Also note that in the case of audio-visual representation, small anomolies which may be missed by a homeostasis plug-in or other analysis plug-in may be detectable by the user.

We probably want to use DBUS for plug-ins; recent trends have indicated that this may be better than integrating dynamically linked plug-ins. This was brought to my attention in an unrelated conversation about security and mandatory access policy with Arjan van de Ven (speaking on his own behalf, not on the behalf of his current or former employers or associates).

Implementation Plan

Implementation Process

Pre-planning on this page.

Data Preservation and Migration

none

Packages Affected

User Interface Requirements

Outstanding Issues


2024-10-23 11:18