var log syslog

Learn about var log syslog, we have the largest and most updated var log syslog information on alibabacloud.com

Ubuntu2.6.22 kernel tree Creation

This article is based on multiple posts on the Internet, but it is not original. The only thing that is gratifying is the implementation on the local machine. Because it failed several times after all. It is also quite difficult for me to learn many

Nfsen Installation Process

Nfsen Before I begin, let me remind you of the excellent documentation of nfdump and nfsen on the following pages: Http://nfdump.sourceforge.net/ Http://nfsen.sourceforge.net/ The only reason I 've compiled this step-by-step guide is because I

Linux driver module initial Tutorial: step by step, from helloworld to insmod-> printk !!!

[1] It is necessary to query the Linux Kernel# Uname-R2.6.28-11-generic # Ls/usr/src/Linux-headers-2.6.28-11 linux-headers-2.6.28-11-generic It can be seen that the kernel version is consistent with the kernel header file version, both 2.6.28-11.

Login ing the DHCP server and log DHCP logs

Normally if you have a cable modem or DSL, you get your home PC's IP address dynamically assigned from your service provider. if you install a home cable/DSL router between your modem and home network, your PC will most likely get its IP address at

Solve the problem that centos automatically mounts the USB flash drive/SD card and is recognized as a read-only file system.

I found that I could not write files to the USB flash drive/SD card today. I carefully checked that the USB flash drive is read-only. I tried to solve this problem using n methods: 1. chmod U + x/Media/usbdisk The prompt "read-only file system"

Install idoutils addon

Idoutils is an addon of icinga used to save data to the database. In this article, I try to use MySQL server, and MySQL server has been installed on another machine. The sever of icinga has been installed before. 1. First install the program

Configure the Linux Log File

Author: Liu Zhiyong Guo conghui Logs should also be noted by users. Do not underestimate the importance of log files for network security. Because log files can record various daily events of the system in detail, you can check the causes of errors

CollectD Plugin: MySQL

One collectdserver: IP: 192.168.91.134; one collectdclient: IP: 192.168.91.133. First, perform a local experiment on collectdserver: 1. Install MYSQL: APT-Get install mysql-server mysql-client. 2. collectD requires a user to connect to MySQL and

Build the Linux kernel source code tree and load the hello Module

Build the Linux kernel source code tree and load the hello Module Build the Linux kernel source code tree and load the hello Module Before loading the module, the book said that we should first establish the kernel source code tree. So, how should

Ubuntu10.04 bind9 configuration Master/Slave zone data transfer problem, ubuntu10.04bind9

Ubuntu10.04 bind9 configuration Master/Slave zone data transfer problem, ubuntu10.04bind9 When configuring dns master-slave zone data transfer on ubuntu10.04 today, the slave server cannot learn the configuration of the master server. When

The file read-only solution for USB flash drives in linux

The file read-only solution for USB flash drives in linux I often use a USB flash drive to transmit files in ubuntu. Recently I don't know why, the USB flash drive can be used normally in windows, but the file becomes read-only in linux, unable to

Why is the server so slow? CPU, RAM, and disk I/O resources are exhausted, and ram is used up

Why is the server so slow? CPU, RAM, and disk I/O resources are exhausted, and ram is used up Machine running is slow because it consumes too many system-specific resources. The main resources of the system include CPU, RAM, disk I/O, and network.

Linux kernel source code tree build and load the hello module, linuxhello

Linux kernel source code tree build and load the hello module, linuxhello Before loading the module, the book said that we should first establish the kernel source code tree. So, how should we establish the kernel source code tree? First, you must

Kibana + Logstash + Elasticsearch log query system, kibanalostash

Kibana + Logstash + Elasticsearch log query system, kibanalostash The purpose of this platform is to facilitate log query During O & M and R & D. Kibana is a free web shell. Logstash integrates various log collection plug-ins and is also an

Linux logger and linux logger

Linux logger and linux logger Logger is used to write logs to the system. It provides a shell command interface to the syslog system module. Logger syntax Logger [options] [messages] ** Options: **-d, -- udp uses the datagram (UDP) instead of the

Ubuntu solves the problem that oom-killer will kill some processes when the cache becomes larger. ubuntu-killer

Ubuntu solves the problem that oom-killer will kill some processes when the cache becomes larger. ubuntu-killer Recently I encountered a problem where the out of memory of the operating system caused the oom-killer system to directly kill the

Send an email to 163 in ubuntu

Environment: ubuntu12.04 I. Install software Apt-get install sendmail Apt-get install sendmail-cf (This software has been installed in the previous step) Apt-get install mailutils Check whether the installation is successful: Enter ps aux | grep

How to install and configure opensips source code

1. Download source code 1.1 opensips source code package download Latest opensips download location: http://opensips.org/pub/opensips/latest/src/ All versions of opensips download location: http://opensips.org/pub/opensips/ 1.2 opensips dependent

Sort out some common commands for Linux to view system logs.

Sort out some common commands for Linux to view system logs. Organize common commands for viewing system logs in Linux Last -A displays the host name or IP address from which to log on to the system in the last line. -D specifies the record

How to configure Nagios Remote Plugin Executor (NRPE) in Linux (1)

How to configure Nagios Remote Plugin Executor (NRPE) in Linux (1) Nagios is one of the most powerful tools for network management. Nagios can monitor the accessibility of remote hosts and the status of running services. But what if we want to

Total Pages: 15 1 .... 9 10 11 12 13 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.