1)/var/log/secure: Record the log in system Access data file;
For example: Pop3,ssh,telnet,ftp and so on will be recorded here.
2)/ar/log/btmp: Record logged in this information record, has been encoded, so must be resolved by the last;
For
Transferred from: http://blog.chinaunix.net/uid-24250828-id-3198922.html1)/var/log/secure: Record log in system to access data files;For example: POP3,SSH,TELNET,FTP, etc. will be recorded here.2)/ar/log/btmp: Record login This information record,
Log Files in centos7
Common Linux Log Files are described as follows:1./var/log/boot. log (self-check process)2./var/log/cron (actions of the child process derived from crontab daemon crond)3./var/log/maillog (activity of emails sent to or from the
One of the keys to the successful management of any system using common log files and commands in Linux is to know what is happening in the system. Exception logs are provided in Linux and the log details are configurable. Linux logs are stored in
For Linux system security, log files are extremely important tools. The system administrator can use logrotate Program Used to manage the latest events in the system.For Linux system security, log files are extremely important tools.The system
The log file contains useful information about the events that occur in the system, and is often used during the course of the troubleshooting or during the performance analysis. For busy servers, the log file size grows extremely fast and the
A log file is a collection of records or files used to record system operation events. The operating system has an operating system log file, and the database system has a database system log file. Today we will introduce the LOG files.
Network
1) logrotate ConfigurationThe Logrotate program is a log file management tool. Used to delete the old log file and create a new log file, we call it "dump".Depending on the size of the log file or the number of days we can dump it, this process is
Log files are helpful in diagnosing and resolving problems in the system, because programs that run on Linux systems often write system messages and error messages to the appropriate log files, so that the system can be "documented" once problems
One of the keys to successful management of any system is to know what is happening in the system. Exception logs are provided in Linux and the log details are configurable. Linux logs are stored in plain text, so you can search and read them
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.