Analisis dan Peningkatan Performa Log File Pada Server dengan Elk Stack
Abstract
Keywords
Full Text:
PDFReferences
C. Tarigan, V. J. L. Engel, and D. Angela, “Sistem Pengawasan Kinerja Jaringan Server Web Apache dengan Log Management System ELK (Elasticsearch, Logstash, Kibana),” J. Telemat., pp. 7–14, 2018, [Online]. Available: https://journal.ithb.ac.id/telematika/article/view/218
P. H. Putra, “Implementasi Log Management Server Menggunakan Elk ( Elastic Implementasi Log Management Server Menggunakan Elk ( Elastic Search , Logstash Dan Kibana ) Stack Pada Server Web Snort Di Pt . Xyz,” J. Inform. Sunan Kalijaga, vol. 4, no. April, pp. 1–8, 2020.
R. Y, A. Kothakota, and S. S, “A study on log file techniques,” vol. 6, no. 04, pp. 2014–2017, 2019.
M. Ruokola, “Centralized log management Miikka Ruokola Bachelor ’ s thesis,” no. May, 2017.
A. Y. El-Bably, “Overview of the Impact of Human Error on Cybersecurity based on ISO/IEC 27001 Information Security Management,” J. Inf. Secur. Cybercrimes Res., vol. 4, no. 1, pp. 95–102, 2021, doi: 10.26735/wlpw6121
P. P. Bavaskar, O. Kemker, and A. K. Sinha, “a Survey on: ‘Log File With Elk Stack Tool,’” Int. J. Res. Anal. Rev., 2019, [Online]. Available: https://ssrn.com/abstract=3677845
IEEE, “Standard for Information Technology,” no. May, pp. 3–6, 2017.
A. Kosasih, “Designing Automation System Based on Log Management for Bank XYZ’s Data Center,” Int. J. Emerg. Trends Eng. Res., vol. 8, no. 5, pp. 1721–1727, 2020, doi: 10.30534/ijeter/2020/37852020.
J. Svacina et al., “On Vulnerability and Security Log file: A Systematic Literature Review on Recent Trends,” ACM Int. Conf. Proceeding Ser., pp. 175–180, 2020, doi: 10.1145/3400286.3418261.
Z. Zamanian, “Anomaly Detection in System Log Files Using Machine Learning,” pp. 1–92, 2019.
Bharvi Dixit, Elasticsearch: A Complete Guide. Published by Packt Publishing Ltd., 2017. [Online]. Available: https://www.packtpub.com/
V. K. Et. al., “Twego Trending: Data Analytics Based Search Engine Using Elasticsearch,” Turkish J. Comput. Math. Educ., vol. 12, no. 1S, pp. 246–251, 2021, doi: 10.17762/turcomat.v12i1s.1764.
H. Ju, J. Wang, E. Zhu, X. Zhang, and F. Zheng, “Design Scheme of a Docker Container File Isolation against Computer Virus Spreading,” Math. Probl. Eng., vol. 2022, pp. 1–6, 2022, doi: 10.1155/2022/5348370.
A. H. S. Ian Miell, Docker in Practice Second Edition, Second edi. Manning Publications Co. All rights reserved. No, 2019.
M. Shrestha, “Exploring Docker Implementation With WORDPRESS,” 2019
DOI: http://dx.doi.org/10.12928/jstie.v12i1.28235
Refbacks
- There are currently no refbacks.
Copyright (c) 2024 M Nerdi Rafli, Emil Naf'an, Eka Praja Wiyata Mandala
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
Jurnal Sarjana Teknik Informatika
Organized by Informatics Department
Published by Universitas Ahmad Dahlan
Website: http://journal.uad.ac.id/index.php/JSTIF
Office: Industrial Technology Faculty, Kampus Utama UAD Jalan Ahmad Yani (Ringroad Selatan), Tamanan, Banguntapan, Bantul, Yogyakarta 55166, Indonesia
Email: herman.yuliansyah@tif.uad.ac.id || jurnalsarjana@tif.uad.ac.id
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.