This paper deals with log collection and analysis, both extremely important part of information security game. We will touch upon using logs in incident response and handling logs in day-to-day routine. Further, we will look at three fundamental problems: log transmission, log collection and log analysis. We will also briefly touch upon log storing and archival.