In the world of cybersecurity, we have multiple Dimensions to deal with. Among this, there is a log analysis, which is a crucial part of threat hunting and incident response. While there are many tools available to do this, one expert analyst should keep a few manual methods to do…