Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
A client/server application designed to let the user monitor a directory
tree on a remote machine by creating snapshots of current file status in order
to later detect file modification, addition and/or removal.
Allows JDBC resources to be monitored. You can see when java.sql objects are being opened and closed and can see the line of code where a resource that is still open was originally opened.
Chainsaw is a GUI log viewer and filter for the Log4J package. It listens for LoggingEvent objects sent using the SocketAppender and displays them in a table. The events can be filtered based on Priority, Thread name, Category name and Message. It can als
Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.
SKUDONET ADC, operates at the application layer, efficiently distributing network load and application load across multiple servers. This not only enhances the performance of your application but also ensures that your web servers can handle more traffic seamlessly.
A Java class library for logging, tracing, warnings, errors, asserts, etc with runtime configurable formatting and event filtering. This project is no longer maintained.
JOOX - the Java-Toolbox is a class library for Java developers. It simplifies the basic works in nearly each Java project (Pojo to J2EE). JOOX includes a generic object-generator, a commandline-parser, a configuration-tool and a cool (meta-)logging-tool.
Deploy Red Hat Enterprise Linux on Microsoft Azure for a secure, reliable, and scalable cloud environment, fully integrated with Microsoft services.
Red Hat Enterprise Linux (RHEL) on Microsoft Azure provides a secure, reliable, and flexible foundation for your cloud infrastructure. Red Hat Enterprise Linux on Microsoft Azure is ideal for enterprises seeking to enhance their cloud environment with seamless integration, consistent performance, and comprehensive support.
The approach of this project is to provide a tool to analyse logfiles. You can specify rules for the extraction of information from any text files and display and browse them in a swing-based GUI.
SimpleLogViewer is Java 2 based GUI application that display logging data. Can read a file or listen over a TCP socket. Use plugins/embedded scripts to Hide, Rewrite, Colorize lines of log.
Eclipse plugin for filtering logs from serial or ssh connection.
This plugin aims to provide an intuitive way of filtering and sorting logs that are coming from ssh or serial connection.
Operating systems: Windows/Linux
Cross-language and cross-platform user's action tracking framework,enabling researchers to respect user's privacy through visual controls which allow users to start/stop/pause data recording,view logged data and opt out of a research study.
The objective of this program is to check log files of your applications. It analyses them and tells you if the application works fine (or not). So that, you just receive one mail to say : "ok", or "some applications seem to go wrong !"
Anicetus is an application telemetry framework. Anicetus defines a language neutral standard for publishing streams of facts about a running application.
SmartTail is a feature rich replacement of the original Unix Tail. It has a nice GUI and is able to monitor a set of Files instead of a single File. File Content can be filtered based on Regular Expressions.
Remote Web Logger is a remote web transaction logging daemon. It operates by passive monitoring of web server traffic to translate web session data to transaction log entries that are written to standard log services such as syslog.
Platform based on JMS queues to centralize System Event Messages (syslog) and Application Layer Messages, persisting them in several Databases and providing several pre- and post- processes according the message's nature, like encryption, mail.