Research Article
[Retracted] Computer Network Information Security Monitoring System Based on Big Data Era
Table 3
Logs’ log audit data table.
| Sequence | Field name | Field type | Defaults | Illustrate |
| 1 | Host | Varchar (32) | Null | Username | 2 | Facility | Varchar (10) | Null | Equipment | 3 | Priority | Varchar (10) | Null | Priority | 4 | Level | Varchar (10) | Null | Levels of danger | 5 | Tag | Varchar (10) | Null | Logo | 6 | Msg | text | | Description of the content of the log | 7 | Seq | int (10) | unsigned | The serial number of the storage log | 8 | Program | Varchar (15) | Null | | 9 | Date | data | Null | Store the date the log was generated | 10 | Time | time | Null | Store the log generation time |
|
|