User-defined Playground

Log Parser Playground

A playground that generates one log parsing activity at a time, and regenerates a new one when you complete each activity. It uses authentic log formats such as nginx access logs and syslog entries to simulate real parsing needs. The operator avoids repeats until it has exhausted the full activity list, then starts a new randomized cycle. Github: https://github.com/lpmi-13/logparser-lab-operator

Startup configuration
cplane-01
Log Parser playground: A playground that generates one log parsing activity at a time, and regenerates a new one when you complete each activity. It uses authentic log formats such as nginx access logs and syslog entries to simulate real parsing needs.

The operator avoids repeats until it has exhausted the full activity list, then starts a new randomized cycle.

Github: https://github.com/lpmi-13/logparser-lab-operator

A playground to practice parsing log lines via general Linux cli tools:

  • grep
  • awk
  • sort
  • uniq
  • head
  • wc

The lab includes 12 activity templates across four log families:

  • Count unique IPs under a target prefix in a target hour
  • Find the busiest Apache client IP for a target status code
  • Count unique Apache error sources for a target status and prefix
  • Rank the top requested paths under a target download-like prefix
  • Find the most common Apache user agent for a target method and prefix
  • Calculate a Nginx 2xx success rate for a target prefix and hour
  • Sum Nginx bytes by IP for a target method and hour
  • Find the username with the most failed SSH logins in a target hour
  • Count distinct source IPs behind failed SSH logins for a target username
  • Find the user with the most successful SSH logins in a target hour
  • Count sudo authentication failures for a target user and hour
  • Find the service with the most syslog error lines in a target hour
Start
Settings