At present, there are several open-source distributed log systems in the industry, such as notify + rsync, Facebook's scribe, Apache's chukwa, linkin's kafa, and cloudera's flume. For more information about these open-source distributed log systems,
Introduction
If the log file is not damaged due to various causes. The tail of log can be used to restore the database to the State in the event of a disaster.
For example:
. A complete backup is made in db_1 and a log backup is made at
Apche Log Series (1): Access log
Want to know when and what people are browsing the content of the site. See Apache's access log to know. The access log is the standard log for Apache, which explains in detail the contents of the Access log and the
One. Nginx error logNginx software will log the fault information of its own operation and the logged information of user access to the specified log file.Typically in the second line of the nginx.conf configuration file, add:Error_log
Iv. Linux/UNIX operating command accumulation [chmod, chown, tail], chmodchownIn Linux/UNIX, users often use the text interface to set the system or operating system. The author is constantly in touch with this command during his work, therefore,
Head Command Chinese Introduction:
Usage: head [options] ... [File] ...
Displays the first 10 lines of each specified file to standard output.
if more than one file is specified, the filename is given as the file header before each segment
Transferred from: http://blog.chinaunix.net/uid-24250828-id-3198922.html1)/var/log/secure: Record log in system to access data files;For example: POP3,SSH,TELNET,FTP, etc. will be recorded here.2)/ar/log/btmp: Record login This information record,
Tail-f is equivalent to--follow=descriptor, tracking according to the file descriptor, when the file is renamed or deleted, the trace stopsTail-f is equivalent to--follow=name--retry, tracked according to the file name, and remains retried, that is,
using Linux/unix next. Often use the text interface to set up the system or the operating system, the author is in command of this aspect of the process of continuous contact. Therefore, in order toThis special brewing, preparation, began the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.