Skip to main content

IMPLEMENTATION LOG MANAGEMENT SYSTEM OF COMPUTER NETWORK DEVICES INFRASTRUCTURES BASED ON ELK STACK


IMPLEMENTATION LOG MANAGEMENT SYSTEM OF COMPUTER NETWORK DEVICES

INFRASTRUCTURES BASED ON ELK STACK






City University




 BACHELOR OF  SCIENCE IN COMPUTER SCIENCE  & Engineering



(Cyber Security) 




Project Report 



IMPLEMENTATION LOG MANAGEMENT SYSTEM OF COMPUTER NETWORK DEVICES INFRASTRUCTURES BASED ON ELK STACK




 Boni Yeamin



Supervised by:



MD SAMRAT ALI ABU

Lecturer 


Department of computer science and engineering   


City University 

Bangladesh








 January 2020









ABSTRACT




Having good decision support is absolutely necessary nowadays because of the need to improve and gain value. For any organization, it is vital to obtain accurate knowledge of inventory level is key for staying in business and making it a profitable one. If inventory tracking is not efficient it could lead to major trouble in any business.


For a business to thrive, it is essential to find the ideal level of inventory where it can sufficiently meet demand without under or overstocking value from anything it can. To understand the flow of any business it is essential to ensure the profitability of the product and the performing level. To make sense of what is happening and what has happened and to get important hints and directions. The impediment in the normal Inventory valuation reports is to obtain support as visualization to get a clear picture, in real time if possible and the solution used needs to be very malleable. To ease in managing data we chose to use Elastic Stack to manage organization data.


The process of making sense of a plain database is based on three big steps: collect, process and use. In order to do so and to make sense of all of this, this project proposes to use an Elastic Stack solution, also known as ELK (Elasticsearch, Logstash, and Kibana), to easily and rapidly manage and to search and create the dashboard for better sense to extract valuable information to stand as decision support. In order to achieve that purpose and obtain valuable information from data all components are used to process data and analyze the result to offer support for decision making




upcoming report ..........................................................



Comments

Popular posts from this blog

Discrete Mathematics - Rules of Inference

To deduce new statements from the statements whose truth that we already know,  Rules of Inference  are used. What are Rules of Inference for? Mathematical logic is often used for logical proofs. Proofs are valid arguments that determine the truth values of mathematical statements. An argument is a sequence of statements. The last statement is the conclusion and all its preceding statements are called premises (or hypothesis). The symbol “ ∴ ∴ ”, (read therefore) is placed before the conclusion. A valid argument is one where the conclusion follows from the truth values of the premises. Rules of Inference provide the templates or guidelines for constructing valid arguments from the statements that we already have. Table of Rules of Inference Rule of Inference Name Rule of Inference Name P ∴ P ∨ Q P ∴ P ∨ Q Addition P ∨ Q ¬ P ∴ Q P ∨ Q ¬ P ∴ Q Disjunctive Syllogism P Q ∴ P ∧ Q P Q ∴ P ∧ Q Conjunction P → Q Q → R ∴ P → R P → Q Q → R ∴ P → R ...

5 best private search engines and why you need to use them.

5 best private search engines and why you need to use them  By:  Boniyeamin laju   ▪   May 31, 2019   ▪ 3 minute read 5 best private search engines and why you need to use  Normal browsers like Google and Bing are designed to track users’ activities and profile their online behavior. The primary reason for this is to create advertisements that will be attractive to the user. However, there-there is always the concern of  personal information being compromised  due to security breaches, state surveillance, and unauthorized data sharing. Fortunately,  private search engines  can help keep your private information safe. Simply put, Private Search Engines, also known as PSE, uses proxy and encrypted search request to  hide your personal information  from anyone looking to misuse your information. Below you will find more information about what a PSE is, how it works, and wh...

Discrete Mathematics - Propositional Logic

The rules of mathematical logic specify methods of reasoning mathematical statements. Greek philosopher, Aristotle, was the pioneer of logical reasoning. Logical reasoning provides the theoretical base for many areas of mathematics and consequently computer science. It has many practical applications in computer science like design of computing machines, artificial intelligence, definition of data structures for programming languages etc. Propositional Logic  is concerned with statements to which the truth values, “true” and “false”, can be assigned. The purpose is to analyze these statements either individually or in a composite manner. Prepositional Logic – Definition A proposition is a collection of declarative statements that has either a truth value "true” or a truth value "false". A propositional consists of propositional variables and connectives. We denote the propositional variables by capital letters (A, B, etc). The connectives connect the propositi...