BKJIA special draft]1. Introduction to important log files in Linux
/Var/log/boot. log
This file records the system events during the boot process, that is, the information displayed during the Linux system boot self-check process, as shown in 1:
Figure 1/var/log/boot.
Http://www.tianya.cn/New/PublicForum/Content.asp? Flag = 1 idwriter = 0 Key = 0 idarticle = 300143 stritem = it
Each computer connected with a network cable can browse the Web page through the ADSL Router, and computer A can view and browse the shared files of computer B, however, computer B can only see but cannot browse the files on computer A. The prompt m
SSH Client View server log Common statements are common statements for Linux for file viewing in folders:1. cd2, tail3. grep [Options] Pattern file-C: Outputs only the count of matching rows.-I: Case insensitive (only for single-character).-H: The file name is not displayed when querying multiple files.-L: Only file names that contain matching characters are outp
same directory for management, so you need to check the location of the log files you have found
If there are other log files in the directory, you know how to do it.
Another thing you should note is the file related to the log user mail. This file name can be varied, or so
Before log is printed in a document, then open the folder, and finally open the document to see what is inside, every time to open the folder feeling very annoying.Some days ago I saw colleagues develop. NET, it is very convenient to use one of his own gadgets to view the contents of the log at all times, so I want to migrate to PHP development.First,
;border:none; "/>650) this.width=650; "src="/img/fz.gif "alt=" Copy Code "style=" Margin-top:10px;border:none; "/>Third, the client code1, a total of two files, the client is can directly run EXE file, MyLog is. NET source code, edited with VS2010. Open the client file and just click Mylog.exe to open the gadget. 2. Clrzmq.dll is a ZMQ auxiliary DLL file in. NET and needs to be introduced into the source code.3, in the client do ZMQ sub operation,
Linux View log file Contents command tail, Cat, TAC, head, EchoTail-f Test.logYou will see that the screen is constantly being printed out. This time interrupts the first process ctrl-c,---------------------------How Linux displays a few lines of a file (in the middle of a few lines)Starting at line No. 3000, displays 1000 rows. The 3000~3999 line is displayedCat FileName | Tail-n +3000 | Head-n 1000Display
the following nei.xsl.com.zone this file to parse the Type master;File "Nei.xsl.com.zone";};};View Wai {match-clients {wan;};Zone "Xsl.com" {Type master;File "Wai.xsl.com.zone";};};Note: When defining a view, all zones must be defined inside the view. 2. Create a data fileNei.xsl.com.zone and Wai.xsl.com.zone These two file
As an Oracle DBA, we sometimes need to track the accidental deletion of data or malicious user operations. In this case, we not only need to find the database account that executes these operations, you also need to know which client (IP address, etc.) sends the operation. To address these problems, the most effective, practical, and cost-effective method is to analyze the log files of the Oracle database.
Data interchange, shutdown, and restart are also recorded in the Wtmp file. All records contain a timestamp.Each time a user logs on, the login program sees the UID of the user in the file lastlog. If found, writes the user's last login, exit time, and host name to standard output, and the login program records the new logon time in Lastlog.After the new Lastlog record is written, the Utmp file opens and inserts the user's utmp record. The record is used until the user logs on and exits. utmp
Linux View log file Contents command tail, Cat, TAC, head, EchoTail-f Test.logYou will see that the screen is constantly being printed out. This time interrupts the first process ctrl-c,---------------------------How Linux displays a few lines of a file (in the middle of a few lines)Starting at line No. 3000, displays 1000 rows. The 3000~3999 line is displayedCat FileName | Tail-n +3000 | Head-n 1000Display
growth_increment value. If these log files grow to a large volume due to many small increments, they will have many virtual log files. This reduces the speed of database startup, log backup, and restoration operations.
Is there less virtual
sent on the network, and the contents of the log files can be monitored in real time. (both require that the log be saved in log4j XML format.)How to use:The software automatically pops up the receiver configuration interface the first time the software is opened.It is recommended to add receiver for the TCP protocol.For Nlog, configure a TCP target and
action is a common situation where cron derives a scheduling process. REPLACE action records the updates to its cron file, which lists the task scheduling to be periodically executed. The RELOAD action occurs shortly after the REPLACE action, which means cron notices that a user's cron file is updated and cron needs to RELOAD it into the memory. This file may find some unusual situations./Var/log/maillogThis log
8.1 what is an archive log fileOracle databases allow you to store full redo log files to offline directories, which are called archive log files.Archive the process of saving the redo log file to the archive log file. This proces
Tail-f Test.logYou will see that the screen is constantly being printed out. This time interrupts the first process ctrl-c,How Linux displays a few lines of a file (in the middle of a few lines)Starting at line No. 3000, displays 1000 rows. The 3000~3999 line is displayedCat FileName | Tail-n +3000 | Head-n 1000Display 1000 rows to 3000 rowsCat filename| Head-n 3000 | Tail-n +1000* Note the order of the two methodsDecomposition:Tail-n 1000: Show last 1000 rowsTail-n + 1000: Starting from 1000 li
Summary of basic operation commands for Binary Log files in MySQL,
MySQL Binary Log, also known as bin-log, is a Binary Log file generated by mysql execution changes. It has two main functions:* Data reply* Master/Slave databases. It is used to add, delete, modify, and maint
online log in the transaction data
2, this method is suitable for archiving the database and has available database full backups.
3, after the restoration of success, remember to do a full backup of the database.
4. It is recommended that the online log files must realize the mirror phase on different disks to avoid this situation, because
Any loss of data is no
1. Cat command:function:1) Displays the entire file.Example: $ cat FileName2) Connect the file string to the basic output, such as merging several files into one file or output to the screen.Example: $ cat file1 file2 > fileDescription: Connect the file string to the basic output (screen or add > FileName to another file)Detailed Cat parameters:-N or –number the number of rows for all outputs starting from 1-B or –number-nonblank and-n similar, except
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.