Solved

Kerberos logs analysing and monitoring

Posted on 2010-09-03
2
782 Views
Last Modified: 2013-12-07
Hello,

do you know any free OSS software for analysing the MIT Kerberos logs, mainly authentication - who has logged in and when, who has logged out and when. It would be good to have some statistical data about logins (average number of logins per day and similar).
0
Comment
Question by:pawwa
2 Comments
 
LVL 3

Accepted Solution

by:
acmeoil earned 500 total points
ID: 33635938
Hello,
 Natively Linux has log files for the Kerberos, you could probably write a script to search the log files for a given text string (logons and such) and via a cron job use sendmail to email the results to you.

 Another alternative if you only wanted to do statistical analysis is to use something like Wireshark then perform a search on the output of that data. You also could integrate the MIT Kerberos with Active Directory then log it through Windows (I know who wants to do that!!! But it is an option)

 Last here are some sites that may be of assistance in general to you.

http://www.linux.com/learn/docs/ldp/574-Kerberos-Infrastructure-HOWTO

Or you could try Kerberos monitor from SolarWinds (Not cheap though)
https://support.ipmonitor.com/helps/54a6d1298c944b8a93731e76acbfb1df.aspx

0
 
LVL 4

Author Closing Comment

by:pawwa
ID: 34162391
^ Not exactly a complete and accurate answer that I was looking for, but anyway thank you. B.

I have found some nice tools for log analysis such as Splunk, but I will write my own solution at the end.
0

Featured Post

Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Internet Speed Test 5 101
Office 365 setting for security 4 63
Encrypt a drive for use only in work environment? 10 56
Outbound Connection to known malware 4 12
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
A customer recently asked me about anti-malware and the different deployment options available for his business. Daily news about cyberattacks, zero-day vulnerabilities, and companies that suffered a security breach made him wonder if the endpoint a…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now