Figure 7
Getting Keys to Create the Event Log
Figure 9
Getting the Event Log