1. syslog introduction syslog is an industrial standard protocol that can be used to record device logs. In UNIX systems, routers, switches, and other network devices, system logs record system events at any time. Managers can view the system
1. syslog IntroductionSyslog is an industrial standard protocol that can be used to record device logs. In UNIX systems, routers, switches, and other network devices, System logs record System events at any time. Administrators can view system
Three functionsOpenlog, Syslog, Closelog is a set of system log write interfaces. The other vsyslog is the same as the Syslog function, except that the parameter formats are different. []http://blog.const.net.cn/a/17152.htm on the net of drinking
The Syslog module is a module that works in a UNIX environment and is not available for Windows, and can be used with the logging module in a Windows environment. First, syslogThe Syslog module can be used to record information about the operation
Linux logger and linux logger
Logger is used to write logs to the system. It provides a shell command interface to the syslog system module.
Logger syntax Logger [options] [messages]
** Options: **-d, -- udp uses the datagram (UDP) instead of the
Use syslog To record UNIX and windows logs-Linux Enterprise Application-Linux server application information. The following is a detailed description. In large-scale network applications or applications with certain security requirements, you
In large-scale network applications or applications with certain security requirements, you usually need to classify and review system logs. By default, each system records its own logs on the local hard disk.In large-scale network applications or
In large-scale network applications or applications with certain security requirements, you usually need to classify and review system logs. By default, each system will record its own logs on the local hard disk. Although there are also logs, there
Syslog configuration log server on
For large-scale network applications or applications with certain security requirements, you usually need to classify and review system logs. By default, each system records its own logs on the local hard
First, the configuration commands are logged to the syslog:Under/ETC/BASHRC of the client, add:Logger-p local3.info \ "' Who am I ' ======================================= is login \"Export prompt_command= ' {msg=$ (History 1 | {read x y; echo $y;});
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.