Log system on LinuxSyslogSyslog-ngOpen sourceBusinessLog level: The level of information verbosity.SUBSYSTEM: facility, facilities.Action:Log scrolling (log cut):#logrotate [OPTION] to scroll, compress, or mail system logs.Configuration file:/etc/logrotate.confTo schedule a task file:/etc/cron.daily/logrotateLog scrolling mechanism for each subsystem:/etc/logrotate.d/*Syslog:Syslog Service:Syslog Service Script:/etc/rc.d/init.d/syslogConfiguration file:/etc/sysconfig/syslogSyslog_options= "OPTIO
First, start the log service
(1) Start log logging on
Note: by de fault, the logging level was set to 3 (error).
The default log level is 3 (error)
(2) Set log level logging Trap Severity_level (1-7)
(3) Check log settings show logging
second, test log output
Test the log information output by following these steps:
(1) Log information is sent to the console port.
Logging Console 7
Quit
This test will generate the following syslog information
111005:
No logging console; No logs are sent to the console;Logging console 3; Sends only 0,1,2,3 level log warnings to the console;Windows log turned into syslog using Ntsyslog;logging on; open log;Logging buffered 64000; Define save log message buffer to 64K;Cisco defaults to logging console 6;Level 7 for debug logging;The default Cisco does not send logs to vty and requires a command if it is to be displayed: Terminal monitor;Note: The command is executed
PHP Regular parsing | extraction | Filtering standard syslog log file contents
Log content:
Dec 15:10:48 root my:192.168.1.51 Test exit Mail Management system
Dec 15:11:23 root my:192.168.1.51 Stella exit Mail management system
...
Extract useful information by regular row by line and return the array
...
After parsing:
Array
[0]=>array (
[0]=>dec 30 15:10:48,
[1]=>root,
[2]=>my,
[3]=>192.168.1.51,
[4]=>test,
[5]=> Exit Mail Management system
),
[1]=>
The following error often occurs when traffic is high on a iptables Web server that is enabled:Ip_conntrack:table full, dropping packetThe cause of this problem is because the Web server received a large number of connections, in the case of iptables enabled, Iptables will all the connections are linked tracking processing, so that iptables will have a link tracking table, when the table full, the above error will occur.Iptables's Link Tracking table has a maximum capacity of/proc/sys/net/ipv4/i
will leave a record.Security log/var/log/secureScreen tools virtual screens, virtual terminals.Sometimes the script runs for a long time and cannot be interrupted halfway. So in order not to let a task accidentally interrupted, you need to ensure that the network can not make any mistakes.There are two ways to solve it:1, put in the background, there is output to the log.Nohup Execute command Log This will run in the background even if the terminal is disconnected.2,screen put in the background
Last Post we analyzed the basic knowledge and configuration of Rsyslog, following we continue to improve the next blog post, the final use of Rsyslog+loganalyzer+mysql deployment log server, to achieve the WebGui display of log information. "Experimental Environment and Topology"System: CentOS 6.5RSYSLOG:RSYSLOGD 5.8.10loganalyzer:loganalyzer-3.6.5lamp:httpd-2.4.4,mysql-5.6.10,php-5.4.13650) this.width=650;
Modifying the mcollective supports syslog output while modifying the default UTC time to local time.Modulemcollectivemodulerpc#anauditplugin thatjustlogstoafile## Youcanconfigurewhichfileitlogstowiththe setting##plugin.rpcaudit.logfile classLogfileThis article is from the "Xiaofeng Moon" blog, make sure to keep this source http://kinda22.blog.51cto.com/2969503/1587623Modify Mcollective's audit support syslog
Use shellSYslog log file write information
ApplicationProgramUse S The log file (in the/var/log directory) That yslog sends messages to the Linux system ). S Ysklogd provides two System Tools : One is System Log Record , The other is kernel information capture. Most programs usually use the C language or S Yslog application or library to send S Yslog message.
1. the logger command is a shell command (interface ). You can use the syslog
Today we recommend a--nxlog
Download Address: http://sourceforge.net/projects/nxlog-ce/files/
installation, because it is in MSI format, so it is not said. A simple configuration is required.
The test platform is Windows 7 64bit, so after installation, the directory and files are as follows:
After installation, you need to configure it, write to the address of the Syslog server, and in the nxlog.conf file in the Conf directory, see:
Module
method can greatly reduce the router processing capability occupied. This is also a good way to view debugging output, because it is stored in a file that can be rolled and output to a workbook,And can be sorted or processed in any way you like. And if you need to view the debugging output on multiple routers at the same time, this is the only feasible method. Remind you again, search on I n t e r n e t, if not by chance u n I X, you can find cheap orFree s y s l o g application. Note that you
lines once you have the MIBs downloaded.
ExportMIBS=
# Snmpd control (yes means start daemon ).
SNMPDRUN=Yes
# Snmpd options (use syslog, close stdin/out/err ).
#SNMPDOPTS='-Lsd-Lf/dev/null-u snmp-g snmp-I-smux-p/var/run/snmpd. pid'// Comment out and change it to the following content
SNMPDOPTS='-Ls2d-Lf/dev/null-p/var/run/snmpd. pid-'
After that, run the command to restart the snmpd service. Then, you can view the system logs again, which
One. Configure Server-side
Configuring the Log server
Install Splunk 64-bit free version2. If there is a firewall on the log server, be sure to open udp514 and tcp146 in inbound rulesTwo. Configuring the Client
Cisco switches, routers1 Open Log service Router (config) #logging on2 Define the log server address Router (config) #logging host 192.168.2.1003 Define time timestamp Router (config) #service timestamps log datetime localtime Show-timezone msec3 Define time timestamp Ro
Purpose of audit:Records events at the core layer, reads and writes files, and calls from the system. Permission statusBelongs to the kernelSyslog purpose:Belongs to the application layer and records all application-layer error messages.Audit has three operating toolsThree commands available for audit:=> Auditctl-controls the kernel audit system, which can be used to retrieve, add, or delete rules, and set the watch for a specific case ).=> Ausearch-the tool used to check the Audit audit logs.=>
Turn from: http://blog.c1gstudio.com/archives/1765
Logstash + Elasticsearch + kibana+redis+syslog-ng
Elasticsearch is an open source, distributed, restful search engine built on Lucene. Designed for cloud computing, to achieve real-time search, stable, reliable, fast, easy to install and use. Supports the use of JSON for data indexing over HTTP.
Logstash is a platform for application log, event transmission, processing, management, and search. You can
No result defined for action jsp_entity. SysLog and result Success
Com.opensymphony.xwork2.DefaultActionInvocation.executeResult (defaultactioninvocation.java:369)
Com.opensymphony.xwork2.DefaultActionInvocation.invoke (defaultactioninvocation.java:271)
Org.apache.struts2.interceptor.debugging.DebuggingInterceptor.intercept (debugginginterceptor.java:256)
Com.opensymphony.xwork2.DefaultActionInvocation.invoke (defaultactioninvocation
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.