Rotation of the log1. Naming rules for log filesA. If the configuration file has the "dateext" parameter, then the log will use the date as the suffix of the log file, for example: "secure-20150630". So the log files do not overlap, so you do not need to rename the log file,
This article describes MySQL log management in detail. This article describes log types, log functions, and common server variables related to MySQL logs, if you need it, you can refer to the log file. it is very important for a server. it records the running information of
, restart and shutdown events. Also this file is a binary file, you need to use the last command to view
/var/prun/utmp
Records the user information that is currently logged in. This file will be changed with the user login and logout, only the current user's information, the same file can not be between VI, you need to use W, who, users and other commands to query
In addition to the system default log, the system services
14th. Log Management14.1Log Management-Introduction1, log service? in CentOS6The Log service in x has been replaced by RSYSLOGD with the original SYSLOGD service. RSYSLOGD Log service More advanced, more features. However, regardless of the use of the service, or the format
consistency. The checkpoint is actually a background process that guarantees that all modified database buffers are written to the data file.The more frequent the checkpoint event, the less data in the redo log that requires data recovery (since the data in the redo log before the recovery checkpoint does not have to be checked when recovering), as soon as the database fails, reducing the recovery time of
Simple and Easy-to-use log management tool LogrotatePreface The log is like the life recorder of a program, recording the details of the program running. Careful selection of logs to record: you do not want to experience the logs that really record problems in the vast sea of logs; careful regular compression of transfer logs: When a fault occurs, the logs are lo
. Several log management methods under Net
Logs are an integral part of an application, not only to record the running state of an application, but also to record bugs that facilitate application updates and modifications.There are several ways to manage logs in. Net.1, database log.2, text log.3, System event
User management of the MySQL database user and log management database1.mysql user account management user account [emailprotected] Username: Account name host: Which client host requests this account can create connection threads, which can be IP, hostname, or network. %: Any character of any length; _: any single cha
Appropriate log management tools can greatly reduce the burden on managing enterprise system log data. However, unless organizations put a certain amount of time and effort into this tool, the best tool will soon become a poor tool. The following six best practices for log manageme
value of this variable at the session level, but it must have super privileges. The scope is global and session level, which belongs to the dynamic variable.sync_binlog=#Set how often the binary log is synchronized to the disk file, 0 means no synchronization, and any positive value represents a synchronization once for each number of writes to the binary. When the value of autocommit is 1 o'clock, the execution of each statement causes the binary
not suppressed. The user can modify the value of this variable at the session level, but it must have super privileges. The scope is global and session level, which belongs to the dynamic variable.sync_binlog=#Set how often the binary log is synchronized to the disk file, 0 means no synchronization, and any positive value represents a synchronization once for each number of writes to the binary. When the value of autocommit is 1 o'clock, the executio
A slightly larger system usually needs to be embedded with a log system. No matter how simple the system is, at least the problem can be located for developers. The common method is not to use the console's printf and file record fwrite functions.In a large system, how should I manage logs? When the system runs for n days and finds a BUG, do I have to intercept printf printing on the console? Generate a huge log
recovery.Innodb_log_buffer_size = {262144 .. 4294967295} # Set the log buffer size used by InnoDB to assist in log file write operations. The unit is byte. The default value is 8 MB. Large transactions can use a larger log buffer to avoid writing data in the log buffer before the transaction is completed, so as to red
1. Log Management(1) IntroductionIn CentOS 6.x, the log service has replaced the original SYSLOGD service via RSYSLOGD . RSYSLOGD Log service More advanced, more features. However, regardless of the use of the service, or the format of the log file is actually compatible wit
, the time the access occurred, the page where the request was accessed, the status information returned by the Web server for the request, the size of the content returned to the client in bytes, the reference address of the request, the type of client browser, and so on.Configuration and management of Apache logsIn this article, it is assumed that Apache runs two virtual hosts: Www.secfocus.com and www.tomorrowtel.com. We need to perform an access
1. Sybase ASE transaction log
Each database of Sybase ASE, whether it is a system database (master, model, sybsystemprocs, tempdb) or a user database, has its own transaction log, and each database has a syslogs table. Logs record user operations on the database, so if you do not need to clear the log, the log will con
the Perl environment can be downloaded http://www.perl.org/. 4.4 Stop Slow query log [mysqld]
#log-Slow-queries[=dir\[filename]
#long_query_time =N Comment out can stop, but the above need to restart the MySQL server, another way to dynamically set the following: #通过设置环境变量slow_query_log进行慢查询日志的动态控制, off means close
set global slow_query_log=off; 4.5 Delete Slow query
log level on a handler, only restrictions are applied to the handler, not to other programs. For example, turning off debug for a file handler means that no debug messages will be written to the log file, but the debug message will be written to standard output. domain log Each server instance forwards a portion of its message to the domain-wide
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.