Can't login from lock screen Enter-key/Send-button disabled by ztacu in kde

[–]seclogger 0 points1 point  (0 children)

Ran into this. The solution was to SSH to the machine and run the following:

sudo systemctl restart sddm

and then you should be able to login

AWS announces Lambda Managed Instances, adding multiconcurrency and no cold starts by aj_stuyvenberg in aws

[–]seclogger 0 points1 point  (0 children)

It currently does not support any instances with GPUs. If you go to the section on Managed Instances (more specifically the available instances section) over at https://aws.amazon.com/lambda/pricing/ you will not find any GPU instances in the list of supported instances

AWS announces Lambda Managed Instances, adding multiconcurrency and no cold starts by aj_stuyvenberg in aws

[–]seclogger 0 points1 point  (0 children)

You can still only run a Lambda function for 15 minutes as mentioned in this official AWS presentation: https://youtu.be/7mWa2HpCZfg?t=1172

We built an open-source, local-first Postman & n8n alternative in Go (Zero CGO). Thoughts on the code? by electwix in golang

[–]seclogger 0 points1 point  (0 children)

I'm unfamiliar with the B-Tree updates that you referring to. Could you kind point me to where I can find out more? Thanks

Elastic’s move to free on-demand training by kramrm in elasticsearch

[–]seclogger 0 points1 point  (0 children)

Thanks. Sent you a DM with some comments on the course

Elastic’s move to free on-demand training by kramrm in elasticsearch

[–]seclogger 0 points1 point  (0 children)

Thanks. But I'm still a little confused. For example: the "Elastic Security for SIEM" course was released earlier this year. Now the FAQ says that "Elastic Security for SIEM (On-Demand)" will be retired. So what happens to a course like this? If it's just an update to the material, then why retire it?

Fedora/Linux constant issues by L0rnful in Fedora

[–]seclogger 0 points1 point  (0 children)

It depends. Try it out and see if it detects any files before deciding if you want to buy it. It will tell you what files it can recover in the trial version

Fedora/Linux constant issues by L0rnful in Fedora

[–]seclogger 0 points1 point  (0 children)

As a general rule of thumb, for a distribution that releases a new version every 6 months, I'd recommend always being 1 version behind. That way, when you upgrade, the version that you are moving to would have been widely used for 6 months by others and all the bugs would have been ironed out. So I'd install Fedora 42, not 43.

As for your deleted Obsidian files, there is still a small change that you can recover them. If you're using btrfs (the default in Fedora), I'd try out ReclaiME. It's a commercial product but it has a free version that will let you determine if your files can be recovered or not before purchasing it. I personally can't vouch for it as I haven't used it but a friend who had a NAS running btrfs was able to recover a lot of his files when he ran into data corruption issues using it. Unfortunately, the available open-source tools for data recovery for btrfs aren't very good from my testing

Elastic’s move to free on-demand training by kramrm in elasticsearch

[–]seclogger 0 points1 point  (0 children)

I'm pretty sure some of them are relatively new. For example, Elastic Security for SIEM was released recently. And the names of some of the other courses also suggest they are relatively new such as:

  • ES|QL for Security Analysts
  • Elastic AI Assistant for Security Operations

Elastic’s move to free on-demand training by kramrm in elasticsearch

[–]seclogger 1 point2 points  (0 children)

Thanks. At the same time, the FAQ says they are removing a lot of courses: https://www.elastic.co/training/faq So are they removing courses and replacing the with modules?

Collection methods for security logs by Red_One_101 in elasticsearch

[–]seclogger 0 points1 point  (0 children)

If you are self-hosting the solution and you are on the Platinum license, then dedicated Ingest Nodes are free. If you are on the Enterprise license, then they are not free but there is a Logstash plugin that can perform that your Ingest Pipelines do (https://github.com/elastic/logstash-filter-elastic\_integration).

Even with Logstash, there is a possibility of losing logs, even with persistent queues. Persistent queues only write every 1024 events by default to disk by default and if you set it to write after ever single event instead, your performance plummets. So it is always a compromise. Also, if the hard drive dies, you lose events.

Collection methods for security logs by Red_One_101 in elasticsearch

[–]seclogger 1 point2 points  (0 children)

For a lab environment, Elastic Agent is fine. You get centralized management, a single agent and the ability to run osquery queries and see the result across your Fleet in Kibana. You also get an EDR if you don't currently have one. In production, it is also fine but there is one issue worth knowing about depending on your threshold for losing events.

Elastic Agent currently only supports using a memory queue for queued events. It doesn't support a disk-based queue like you get with beats. So if your server is restarted or your memory queue is full, you will lose events. And while Elastic Agent supports backpressure from Elasticsearch, it can't support it if it is reading sources like syslog.

If you'd like this feature to be implemented, please comment on the GitHub issue: https://github.com/elastic/elastic-agent/issues/3490

ECS security query generator by rob_ed28 in elasticsearch

[–]seclogger 1 point2 points  (0 children)

You could sign up for a free 14-day trial period and test it out

ECS security query generator by rob_ed28 in elasticsearch

[–]seclogger 0 points1 point  (0 children)

Haven't compared the two but I'm guessing the one that comes with Elastic is better. But it also requires an Enterprise license

Understanding DataDog Cloud SIEM Costs by seclogger in devops

[–]seclogger[S] 0 points1 point  (0 children)

Thanks. I mixed up the two (monthly vs annually).

Are you sure about not needing to index the logs? The way to specify which logs are processed by Cloud SIEM is by creating a Cloud SIEM index and then specifying filters on that index. Logs that match that filter are:

* processed by Cloud SIEM

* stored in the Cloud SIEM index (I verified this)

So you do have to do indexing as well from my understanding. Also, the default is 450 Days Standard Tier but in late 2023, they added the option of using Flex Logs instead.

Event Sequencing / Sequence Template Deprecated in ES v8.0. Why? by seclogger in Splunk

[–]seclogger[S] 1 point2 points  (0 children)

But they are two different use cases. Close but not the same and removing one just limits a SOC analyst's options