These files are compressed by the Cowic library, which operates on each of their columns independently, unlike “parser-based” methods. A data structure partially named for these files utilizes Bloom filters to query a hierarchy of SSTables and is used instead of B-trees in many write-optimized database systems. They’re not keys, but the process of limiting the size of these files is termed their namesake “rotation.” A popular data analytics stack consists of Elasticsearch, a tool named for these files, and Kibana. (*) Journalctl (“journal-CTL”) and Event Viewer are tools used to view the contents of these files on Linux and Windows. In December 2021, Alibaba Cloud announced a zero-day vulnerability allowing arbitrary code execution in Java’s “4j” utility for these files. Entries in these files are typically tagged with namesake levels, such as INFO, DEBUG, and WARN. For 10 points, name these append-only files used to monitor, debug, and audit computer systems. ■END■
ANSWER: logfiles [or logs; accept any specific types of logs such as system logs and event logs; accept log-structured merge tree, Logstash, log rotation; accept audit trails; accept journal until “journalctl” is read; prompt on LSM tree or LSMT]
<DN, Other Science (Computer Science)>
= Average correct buzz position