After porting busybox to Android, I want to play with syslogd. So I first link busybox into a syslogd to facilitate subsequent direct command start:
Ln-s busybox syslogd
Ls-l
Lrwxrwxrwx Root syslogd-> busybox
OK. Now you can start it:
1 | root @
Daemon Xinted and Syslogd
1. Create a daemon
1. Make the init process the parent process of the newly generated process.
After the fork function is called to create a sub-process, the parent process immediately exits. In this way, the child process
1. the composition structure of BSDsyslogd: it can be seen that the relevant log files mainly come from three ways: (1) kernel: many kernel routines call the log function to generate log messages, in addition, the klogd daemon can listen to and
#! /Bin/bash # syslog starts syslogd/klogd. ### chkconfig: 2345 12 88 # Description: syslog is the facility by which when daemons use to log/# messages to various system log files. it is a good idea to always/# Run syslog. ### begin init info #
In large-scale network applications or applications with certain security requirements, you usually need to classify and review system logs. By default, each system records its own logs on the local hard disk.In large-scale network applications or
What is chroot? Chroot basically defines the running environment of a program. More specifically, it redefines the "root" directory or "/" of a program (or login session).
That is to say, for a chroot program or shell, directories outside the chroot
What is chroot? Chroot basically defines the running environment of a program. More specifically, it redefines the "root" directory or "/" of a program (or login session).
That is to say, for a chroot program or shell, directories outside the chroot
Syslog configuration log server on
For large-scale network applications or applications with certain security requirements, you usually need to classify and review system logs. By default, each system records its own logs on the local hard
Use syslog To record UNIX and windows logs-Linux Enterprise Application-Linux server application information. The following is a detailed description. In large-scale network applications or applications with certain security requirements, you
In large-scale network applications or applications with certain security requirements, you usually need to classify and review system logs. By default, each system will record its own logs on the local hard disk. Although there are also logs, there
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.