Database Reference
In-Depth Information
t.info(Integer.toString(i) + ': ' + name);
i = i + 1
es.close()
Regarding the consolidation of different log types, we have to stress the fact that we have
been talking about different technical types from/within generic SOA technical frame-
works (two previous figures, first and third). We are quite far from suggesting that you
should put all logs in one location (DB) and monitor them from the same dashboard by
the same personnel. Trying to find analogy, we can say that even if it is possible to put all
of the corporate traffic in one TCP/IP-based backbone (for cost optimisation, for in-
stance), security guys and emergency brigades would never be happy to have fire sensor
wires, VIP landline phones, and intrusion detection channels combined with a regular
business network (simply put, it' a bit more than just SPOF).
Similar to this, we have not one, not two, but many types of logs, which will be grouped
for diligent monitoring by different teams of experts, sometimes reasonably separated;
please see the following figure. Although it could be annoying, there are some strong
reasons why SOA business ops cannot have immediate access to Secure Gateway or IDS
logs. At the same time, Security and SOA Architects must constantly coordinate their ef-
forts on a regular basis, and what is absolutely unacceptable is when DB logs are kept
only for DBA.
Thus, a comprehensive but still a minimal model on the following figure must be designed
as the basis; however, it should be carefully adjusted according to your business model
and Industrial Policies/Regulation (PCI, Healthcare, and so on).
Search WWH ::




Custom Search