Well, I certainly didn't see myself writing up to 7 parts of log file investigation series. While there is certainly no fan base, from time to time when I pass such workflow to friends and colleagues, it certainly helped them to cut short the log file hunt.
So I thought, why not I do it for software distribution as well? Even though I did highlight on the previous series, part 7 & 8 will be more comprehensive. Here is a typical flow of software distribution. I try to be more generic and possible the below flow might differ from environment to environment.
Here it is:
Don't forget to check out the rest of the log investigation series blogs as well:
http://cmxp.blogspot.sg/2015/04/log-file-investigation-part-1.html
http://cmxp.blogspot.sg/2015/04/log-file-investigation-part-2.html
http://cmxp.blogspot.sg/2015/04/log-file-investigation-part-3.html
http://cmxp.blogspot.sg/2015/06/log-file-investigation-part-4.html
http://cmxp.blogspot.sg/2015/08/log-file-investigation-part-5-software.html
http://cmxp.blogspot.sg/2015/08/log-file-investigation-part-6-software.html
Happy reading! :)
SY
No comments:
Post a Comment