{"id":70314,"date":"2024-08-27T15:51:51","date_gmt":"2024-08-27T14:51:51","guid":{"rendered":"https:\/\/www.n-able.com\/?p=70314"},"modified":"2025-08-28T10:38:20","modified_gmt":"2025-08-28T09:38:20","slug":"log-parsing-for-network-security-threat-detection","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/log-parsing-for-network-security-threat-detection","title":{"rendered":"Log Parsing for Network Security Threat Detection"},"content":{"rendered":"<p class=\"ai-optimize-6 ai-optimize-introduction\">Firewall, VPN, and network security device logs can provide insight into a wide variety of malicious activities, including remote code executions, port scanning, denial of service attacks, and network intrusions. However, analyzing these logs presents several challenges.<\/p>\n<p class=\"ai-optimize-7\">These data streams are high velocity; even small and medium networks can produce thousands of logs per second with significant fluctuations throughout the day. A network comprises several different devices manufactured by different companies, so manually defining rules for parsing log data is unfeasible and would break as devices are updated. Preventive measures against malicious activity must be taken quickly, meaning that we need an online process to deliver insights that are useful for more than forensics.<\/p>\n<p class=\"ai-optimize-8\">We\u2019ve designed around these challenges and built a fast, parallelizable system capable of handling new log formats and deployable on streaming data. We own a patent that covers this method for ascertaining whether log data is anomalous and indicative of threats, malfunctions, and IT operations failures<\/p>\n<p class=\"ai-optimize-9\">Malicious activity nearly always produces unusual log data, so our system focuses first on finding anomalous data. Focusing on anomalous logs drastically decreases the volume of data that must be analyzed for malicious activity without running the risk of ignoring pertinent data. In this discussion, we\u2019ll focus on how we determine whether log data is anomalous, as doing so enables a wide variety of techniques for searching for malicious activity.<\/p>\n<p class=\"ai-optimize-10\">As an overview, our system trains itself on-device log data that we\u2019ve recently received. Based on the data, the system builds a set of templates that correspond to commonly seen log content and structure. The system also computes a measure of how rare each template is and builds an anomalous scoring threshold. When new data is received, it\u2019s checked against this template set and assigned a score based on the template that best matches the data. If new data that does not directly correspond to a template arrives, then a measure of the difference is added to the score. Data with a score above the anomalous scoring threshold is considered anomalous.<\/p>\n<h2 class=\"wp-block-heading ai-optimize-11\">Training<\/h2>\n<p class=\"ai-optimize-12\">We begin by training our system in a batch process on recently ingested log data. We create a set of templates by grouping similar logs together. Automated systems generate logs, so they contain a mix of parameters (e.g., an IP address, a timestamp, or a username) and fixed messages (e.g., \u201cconnection opened\u201d or \u201cuser logged in\u201d). Our system uses a token-based parser tree to associate logs that have the same fixed messages, but that may have differing parameters.<\/p>\n<figure class=\"wp-block-image has-white-bg\"><img loading=\"lazy\" decoding=\"async\" width=\"864\" height=\"368\" src=\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/Picture1-2-1.png\" alt=\"\" class=\"wp-image-4414\" \/><\/figure>\n<p class=\"ai-optimize-13\">Before applying the parser tree, logs are preprocessed. Logs are tokenized according to common delimiters. Then, they are preprocessed by applying pre-defined regex patterns that replace well-known parameters (e.g., r\u2019 [0-9a-fA-F]{12}\u2019 for a 12-digit hexadecimal value) with specialized parameter tokens. Typically, any token that contains a number is also treated as a parameter and replaced with a parameter token. Once preprocessed, the parser tree can determine log associations.<\/p>\n<figure class=\"wp-block-image has-white-bg\"><img loading=\"lazy\" decoding=\"async\" width=\"850\" height=\"604\" src=\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/Picture2-2.png\" alt=\"\" class=\"wp-image-4416\" \/><\/figure>\n<p class=\"ai-optimize-14\">Thus, the intuition is that logs said to be similar in the content will have similar sequences of messages and parameters that can be represented as tokens for easy comparison. The first layer of the parser tree is assigned based on the total number of tokens in the preprocessed log. This step is utilized because parameters are typically a fixed number of tokens, meaning this step quickly groups associated logs. Subsequent layers of the parser tree are fit according to the token in the nth position of the preprocessed log, where n comes from a pre-defined set of token positions. To prevent parser tree explosion, if the number of branches at any given layer exceeds a threshold, then a wild card token is used for all new tokens.<\/p>\n<figure class=\"wp-block-image has-white-bg\"><img loading=\"lazy\" decoding=\"async\" width=\"850\" height=\"624\" src=\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/Picture3-2.png\" alt=\"\" class=\"wp-image-4417\" \/><\/figure>\n<p class=\"ai-optimize-15\">Once the bottom of the parser tree is reached, if there are no other logs already at this position of the parser tree, then the incoming log is used as a new log format. Otherwise, the incoming log is compared to the log formats at this position using token edit distance.<\/p>\n<p class=\"ai-optimize-16\">If the incoming log is sufficiently similar to an existing log format, then the log is associated with that format. In addition, the log format is updated such that any dissimilar tokens between the log format and the incoming log are replaced with wildcard tokens. If the incoming log is insufficiently similar to all existing log formats, then the incoming log is used as a new log format.<\/p>\n<p class=\"ai-optimize-17\">Once all training logs have been processed, all the log formats generated by the parser tree are returned. Particularly rare log formats are dropped. For each log format, we generate a log template which includes: a regular expression pattern capable of matching logs associated with the template, a set of the tokens contained in the log template, and a log template score based on the frequency that the log template appeared in the training set.<\/p>\n<figure class=\"wp-block-image has-white-bg\"><img loading=\"lazy\" decoding=\"async\" width=\"864\" height=\"240\" src=\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/Picture4-2.png\" alt=\"\" class=\"wp-image-4418\" \/><\/figure>\n<p class=\"ai-optimize-18\">Another set of recent log data is used to generate a score threshold. Logs in this dataset are scored using the log templates. To score, an incoming log is preprocessed and checked to see if it matches any log templates\u2019 regular expression pattern. If the incoming log matches a regular expression pattern, then it is assigned the score associated with the log template that it matches.<\/p>\n<p class=\"ai-optimize-19\">Otherwise, the incoming log\u2019s tokens are compared to each of the log templates\u2019 token sets using Jaccard similarity. The incoming log is associated with the log template that has the most similar token set and assigned a score based on the log template\u2019s score and the similarity between the token sets. This matching process allows previously unseen log formats to be assigned appropriate rarity scores.<\/p>\n<p class=\"ai-optimize-20\">Once all the score threshold dataset has been processed, all scores assigned to logs are considered. Based on these scores, a global score threshold is determined using the percentile score and standard deviation of the set of all scores.<\/p>\n<h2 class=\"wp-block-heading ai-optimize-21\">Inference<\/h2>\n<p class=\"ai-optimize-22\">In contrast to the training process, inference occurs in a streaming environment and finds anomalous records in near real-time.<\/p>\n<p class=\"ai-optimize-23\">As in the score threshold process, incoming logs are preprocessed and either matched to log templates using regular expression patterns or token set similarity. The incoming log is assigned a score of the matched log template or the matched log template and a similarity measure, respectively. If the incoming log\u2019s score is greater than the score threshold, then the log is considered anomalous.<\/p>\n<p class=\"ai-optimize-24\">To facilitate real-time analysis, we utilize AWS Lambda for conducting inference and a DynamoDB table for template storage. We\u2019re able to spin up additional Lambda instances automatically and adjust DynamoDB read capacity as needs demand them.<\/p>\n<p class=\"ai-optimize-25\">Classifying logs and assigning rarity scores opens a wide variety of analysis opportunities: keyword lists that would otherwise generate numerous false positives are more effective when applied to the anomalous dataset. Log template associations enable time series analysis of specific log messages. By determining the location of parameters, specific information can be extracted and analyzed, even in unseen log formats. The Adlumin platform leverages a variety of these techniques to provide preventative alerts of specific threats, malfunctions, and IT operations failures.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Enhance log anomaly detection with real-time scoring, template matching, and AWS Lambda. Discover better threat detection and IT failure alerts with Adlumin.<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-70314","post","type-post","status-publish","format-standard","hentry","topic-cyber-resilience","topic-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Log Parsing for Network Security Threat Detection - N-able<\/title>\n<meta name=\"description\" content=\"Detect log anomalies in real time with AWS Lambda and template matching. Improve IT threat alerts and failure detection using Adlumin\u2019s innovative analysis.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/log-parsing-for-network-security-threat-detection\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Log Parsing for Network Security Threat Detection - N-able\" \/>\n<meta property=\"og:description\" content=\"Detect log anomalies in real time with AWS Lambda and template matching. Improve IT threat alerts and failure detection using Adlumin\u2019s innovative analysis.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/log-parsing-for-network-security-threat-detection\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-27T14:51:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-28T09:38:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/08\/2508_Adlumin_BlogHeaders_LogParsing.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"N-able\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"N-able\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/log-parsing-for-network-security-threat-detection#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/log-parsing-for-network-security-threat-detection\"},\"author\":{\"name\":\"N-able\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\"},\"headline\":\"Log Parsing for Network Security Threat Detection\",\"datePublished\":\"2024-08-27T15:51:51+01:00\",\"dateModified\":\"2025-08-28T09:38:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/log-parsing-for-network-security-threat-detection\"},\"wordCount\":1199,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/log-parsing-for-network-security-threat-detection#primaryimage\"},\"thumbnailUrl\":\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/Picture1-2-1.png\",\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/log-parsing-for-network-security-threat-detection\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/log-parsing-for-network-security-threat-detection\",\"name\":\"Log Parsing for Network Security Threat Detection - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/log-parsing-for-network-security-threat-detection#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/log-parsing-for-network-security-threat-detection#primaryimage\"},\"thumbnailUrl\":\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/Picture1-2-1.png\",\"datePublished\":\"2024-08-27T15:51:51+01:00\",\"dateModified\":\"2025-08-28T09:38:20+00:00\",\"description\":\"Detect log anomalies in real time with AWS Lambda and template matching. Improve IT threat alerts and failure detection using Adlumin\u2019s innovative analysis.\",\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/log-parsing-for-network-security-threat-detection\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/log-parsing-for-network-security-threat-detection#primaryimage\",\"url\":\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/Picture1-2-1.png\",\"contentUrl\":\"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/Picture1-2-1.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b\",\"name\":\"N-able\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g\",\"caption\":\"N-able\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Log Parsing for Network Security Threat Detection - N-able","description":"Detect log anomalies in real time with AWS Lambda and template matching. Improve IT threat alerts and failure detection using Adlumin\u2019s innovative analysis.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/log-parsing-for-network-security-threat-detection","og_locale":"fr_FR","og_type":"article","og_title":"Log Parsing for Network Security Threat Detection - N-able","og_description":"Detect log anomalies in real time with AWS Lambda and template matching. Improve IT threat alerts and failure detection using Adlumin\u2019s innovative analysis.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/log-parsing-for-network-security-threat-detection","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2024-08-27T14:51:51+00:00","article_modified_time":"2025-08-28T09:38:20+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2025\/08\/2508_Adlumin_BlogHeaders_LogParsing.png","type":"image\/png"}],"author":"N-able","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"N-able","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/log-parsing-for-network-security-threat-detection#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/log-parsing-for-network-security-threat-detection"},"author":{"name":"N-able","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b"},"headline":"Log Parsing for Network Security Threat Detection","datePublished":"2024-08-27T15:51:51+01:00","dateModified":"2025-08-28T09:38:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/log-parsing-for-network-security-threat-detection"},"wordCount":1199,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"image":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/log-parsing-for-network-security-threat-detection#primaryimage"},"thumbnailUrl":"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/Picture1-2-1.png","inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/log-parsing-for-network-security-threat-detection","url":"https:\/\/www.n-able.com\/fr\/blog\/log-parsing-for-network-security-threat-detection","name":"Log Parsing for Network Security Threat Detection - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"primaryImageOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/log-parsing-for-network-security-threat-detection#primaryimage"},"image":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/log-parsing-for-network-security-threat-detection#primaryimage"},"thumbnailUrl":"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/Picture1-2-1.png","datePublished":"2024-08-27T15:51:51+01:00","dateModified":"2025-08-28T09:38:20+00:00","description":"Detect log anomalies in real time with AWS Lambda and template matching. Improve IT threat alerts and failure detection using Adlumin\u2019s innovative analysis.","inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/log-parsing-for-network-security-threat-detection"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr\/blog\/log-parsing-for-network-security-threat-detection#primaryimage","url":"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/Picture1-2-1.png","contentUrl":"https:\/\/adlumin.wpenginepowered.com\/wp-content\/uploads\/Picture1-2-1.png"},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/f46a000e389b6d02bd4b3866e7828a7b","name":"N-able","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9c468b7c98137ecdd5508befa660c205a7978133257080a37fb0b1362d53411?s=96&d=mm&r=g","caption":"N-able"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/70314","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=70314"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/70314\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=70314"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}