Tags: mysql management rsyslogExperimental Summary:This experiment hosts the system as CentOS 6.9 by default.HOST1 host as Remote log client Installation: Rsyslog (default installation), Rsyslog-mysqlHost2 host as Log server installation: MySQL (default installation, can also install MARIADB 5 version)HOST3 Host graphical Management installation:httpd php php-mysql php-gd loganalyzer
Tags: rsyslog mysql loganalyzer
write in front: If this article is fortunate enough to be seen by a friend and found wrong, I hope to criticize. If you do not understand the place, we would like to discuss together.
Installing Apache
On CentOS6.5, Apache is already installed by default. If it is not installed, proceed as follows to install the following steps:# yum-y Install httpdStart the httpd service# service httpd StartSettin
This is a creation in
Article, where the information may have evolved or changed.
The Transport Layer Security Protocol (TRANSPORT layer safety, abbreviation: TLS), and its predecessor, Secure Sockets Layer (secure Sockets layer, abbreviation: SSL) is a security protocol designed to provide security and data integrity assurance for Internet communications.
SSL contains the record layer and the transport layer, and the recording layer protocol determin
Use rsyslog to audit linux operations, rsysloglinux
Environment: The rsyslog service must be installed on both the client and server.
Rsyslog server
Cd/etc/rsyslog. d/cat server. conf $ ModLoad imtcp $ InputTCPServerRun 514 vim/etc/rsyslog. conflocal4. */var/log/history.
Write shell script execution to Rsyslog Log Server
In the O M work, it is inevitable to write some scripts for scheduled tasks (cron) to regularly execute some daily work to automate the O M work. For example, backing up data in my daily work is an important task. You need to regularly back up the data to the backup server and some other backup media. Most of the backup work is written to the script, and the/etc/crontab is edited to regularly comple
like AF_KTLS, but I've brushed it off again and again, until now, I've left the company, and I'm not even doing anything related to SSL/TLS or PKI, but suddenly let me know there's a ready-made solution from Facebook, It's been 2016 years! Facebook's program came from 2015, but we can actually do it earlier, but no, so I'm very sorry! The reason I'm saying this is because I almost don't need you to think about it. Step by step keep up with Dave Watso
Tags: deploying log server with Rsyslog+loganalyzer+mysql under CentOSFirst, install and set the lamp environmentyum-y Install httpd mysql* php*Second, installation RsyslogServer-side:Yum Install Rsyslog Rsyslog-mysqlRsyslog-mysql: Transferring logs to the MySQL databasemysql-uroot-p1234 Configure Data permissions # Mysql-uroot–pMysql> Grant all on syslog.* to [
ObjectiveDue to the transmission of data in TCP, UDP, etc., it is possible for the packet to be intercepted by others and to parse out the information, which poses a great challenge to information security. The initial SSL protocol was proposed by Netscape, which does not affect upper-layer protocols (such as HTTP, e-mail, etc.), but can guarantee the communication security of the upper layer protocol. If SSL is used correctly, a third party can only infer the end addresses of the connection, th
The "Transport Layer Security Protocol" evolved from SSL can use encryption technology to protect the privacy of TCP communication (information leakage) and integrity (whether data is tampered with during transmission ). RFC 3207 specifies an extended mechanism called starttls for SMTP. Its main purpose is to ensure the privacy of point-to-point communication and ensure that your emails are not sent to the wrong place. For example, avoid shipping parcels to illegal systems disguised as recipient
. Filter (log filter)Filter is a highlight of rsyslog, and usually we don't have all the logs to collect, such as we only need to error The following level of log, or we want to include a specific content of the log. With the use of filter, we can easily implement these requirements. Here are a few examples of how to use the Manual in detail:
12
:msg, contains,"test_message"/var/log/test.log~
If the log content contains
Tags: ges info conf Touch # MySQL Create cat receiveConstruction LNMP See Http://liang-yao.cnblogs.com/p/8448362.htmlYum Install-y Rsyslog-mysqlImport Database Mysql-u Root-p Available through RPM-QL Rsyslog-mysql | grep createdb Query Location /usr/share/doc/rsyslog-7.4.7/mysql-createdb.sql Create a user and grant permissions Grant all on syslog.* to [e-mail pr
By default, SMTP traffic is not encrypted, which leads to e-mail communication on the public network as if it were broadcast, and anyone who intercepts the message can easily read its contents. But there are many sensitive messages in the real world that are sent by mail, so one way to secure the message is to use the Transport Layer Security Protocol (Transport layer safety) to provide the encryption of the SMTP traffic in transit, TLS-protected SMTP
PE format eighth, TLS table (thread-local storage)IbinarySource: http://www.cnblogs.com/iBinary/All rights reserved, welcome to keep the original link to reprint:)I. Review thread-related knowledgeThe first time to explain the TLS, you need to review thread-related knowledge (thread local storage)1. Understanding Classic Sync IssuesFirst we write a C + + code, open two threads to run to see if there will be
Note:
A. this article describes the brief Implementation of the Linux nptl thread stack and the principle of local thread storage. In the experimental environment, the Linux kernel version is 2.6.32, the glibc version is 2.12.1, And the Linux release version is ubuntu, the hardware platform is a 32-bit x86 system.B. There are many topics about Linux nptl threads. This article selects the private address space of each thread for discussion, namely the thread stack and
Linux system logs and their rsyslog service logs are plain text files/var/logs used by the system to record some messages related to the system runtime to save a large number of logs of plain text logs. maintain the running status of related programs, error message. to analyze system running errors... linux system logs and rsyslog service
A log is a plain text file/var/log used by the system to record some
3. Use
Usage: local4.*: ommysql:server:port,yourdb,yourname,yourpass;
Example: local4.*: Ommysql:127.0.0.1:3306,yourdb,yourname,yourpass;
4. Global configuration file example.
vi/etc/rsyslog.conf//edit rsyslog Global file
# rsyslog v5 configuration file
# For more information see /usr/share/doc/rsyslog-*/rsyslog_c
Experimental requirements
Build a visual log collection and analysis platform for centralized collection of logs, and through the visualization of log analysis tools to present;
Apps server is to collect the log nodes, can have more than one, here I only use 1 node;
Rsyslog server is unified to receive each nodes submitted to the log, monitoring in the TCP/UDP 514 nodes;
MySQL server is used to store the submitted log infor
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.