<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Architectures on</title><link>https://docs.protegrity.com/10.2/docs/aog/architecture/</link><description>Recent content in Architectures on</description><generator>Hugo</generator><language>en</language><atom:link href="https://docs.protegrity.com/10.2/docs/aog/architecture/index.xml" rel="self" type="application/rss+xml"/><item><title>Logging architecture</title><link>https://docs.protegrity.com/10.2/docs/aog/architecture/esa_logging_architecture/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/10.2/docs/aog/architecture/esa_logging_architecture/</guid><description>&lt;h2 id="architecture-overview">Architecture overview&lt;/h2>
&lt;p>Logging follows a fixed routine. The system generates logs, which are collected and then forwarded to Insight. Insight stores the logs in the Audit Store. The Audit Store holds the logs and these log records are used in various areas, such as, forensics, alerts, reports, dashboards, and so on. This section explains the logging architecture.&lt;/p>
&lt;p>&lt;img src="https://docs.protegrity.com/10.2/docs/images/logging_arch_10_2_0.png" alt="" title="Architecture: Overview">&lt;/p>
&lt;ul>
&lt;li>
&lt;p>&lt;strong>ESA:&lt;/strong>&lt;/p>
&lt;p>The ESA has the &lt;strong>td-agent&lt;/strong> service installed for receiving and sending logs to Insight. Insight stores the logs in the Audit Store that is installed on the ESA. From here, the logs are analyzed by Insight and used in various areas, such as, forensics, alerts, reports, dashboards, visualizations, and so on. Additionally, logs are collected from the log files generated by the Hub Controller and Membersource services and sent to Insight. By default, all Audit Store nodes have all node roles, that is, Master-eligible, Data, and Ingest. A minimum of three ESAs are required for creating a dependable Audit Store cluster to protect it from system crashes. The architecture diagram shows three ESAs. Legacy protectors send logs to the ESA using the Log Facade.&lt;/p></description></item><item><title>Overview of the Protegrity logging architecture</title><link>https://docs.protegrity.com/10.2/docs/aog/architecture/iag_log_intro/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/10.2/docs/aog/architecture/iag_log_intro/</guid><description>&lt;h2 id="overview-of-logging">Overview of logging&lt;/h2>
&lt;p>Protegrity software generates comprehensive logs. The logging infrastructure generates a huge number of log entries that take time to read. The enhanced logging architecture consolidates logs in Insight. Insight stores the logs in the Audit Store and provides tools to make it easier to view and analyze log data.&lt;/p>
&lt;p>When the user performs some operation using Protegrity software, or interact with Protegrity software directly, or indirectly using a different software or interface, a log entry is generated. This entry is stored in the Audit Store with other similar entries. A log entry contains valuable information about the interaction between the Protegrity software and a user or other systems.&lt;/p></description></item></channel></rss>