{"version":"1.0","provider_name":"CloudSecurityWeb","provider_url":"https:\/\/cloudsecurityweb.com\/articles","author_name":"csw","author_url":"https:\/\/cloudsecurityweb.com\/articles\/author\/csw\/","title":"Mastering Docker Log Management in Cloud Security - CloudSecurityWeb","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"riOJh6mqz1\"><a href=\"https:\/\/cloudsecurityweb.com\/articles\/2024\/03\/14\/mastering-docker-log-management-in-cloud-security\/\">Mastering Docker Log Management in Cloud Security<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/cloudsecurityweb.com\/articles\/2024\/03\/14\/mastering-docker-log-management-in-cloud-security\/embed\/#?secret=riOJh6mqz1\" width=\"600\" height=\"338\" title=\"&#8220;Mastering Docker Log Management in Cloud Security&#8221; &#8212; CloudSecurityWeb\" data-secret=\"riOJh6mqz1\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/cloudsecurityweb.com\/articles\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/images.unsplash.com\/photo-1610545749949-cb587f457385?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wzOTg1NTZ8MHwxfHNlYXJjaHw0fHxkb2NrZXJ8ZW58MHwwfHx8MTcxMDM4NDA2Mnww&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=1080","thumbnail_width":600,"thumbnail_height":400,"description":"Master Docker log management in cloud security and enhance your organization's overall security posture. Gain valuable insights, detect threats, and ensure compliance. Discover best practices and tools in this blog post. Click now!"}