<

[Product update] Infrastructure Analysis Tool is now available with Business Accounts.Learn More

x

Log file problem - CircularLogArchiver

Published on
4,707 Points
1,207 Views
5 Endorsements
Last Modified:
Shaun Vermaak
My name is Shaun Vermaak and I have always been fascinated with technology and how we use it to enhance our lives and business.
This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled

Logging is a good thing but unfortunately, it comes at a cost of disk space. and if left uncheck it can lead to systems running out of space.

If the particular system supports this, circular logging should be enabled to mitigate. Circular logging works but overwriting oldest logs first.

 


cl.png

Above shows the process to enable circular logging in Exchange


This is great if the system supports it however if it doesn't, it forces administrators to manually clear logs, preferably before disk runs out of space.


This is where CircularLogArchiver comes in. It enables circular logging functionality on any log files.


Usage : CircularLogArchiver.exe GO [/LP:LogPath] [/LE:LogExtention] [/AI:ArchiveInterval] [/AOT:ArchiveOlderThan] [/DAOT:DontArchiveOlderThan] [/DOT:DeleteOlderThan]


Example : CircularLogArchiver.exe GO /LP:”C:\Logs” /LE:”*.log” /AI:”M” /AOT:”1″ /DAOT:”3″ /DOT:”3″


Example above will archive all files in “C:\Logs” with *.log extension that are between one and three months old and it will delete files older than three months


CircularLogArhiver can be downloaded from http://blog.ittelligence.com/wp-content/uploads/2017/10/CircularLogArchiver.zip

clbefore.png

Before

clafter.png

After

Please do not forget to press the "Thumb's Up" button if this article was helpful and valuable for EE members.
It also provides me with positive feedback. Thank you!  
5
0 Comments

Featured Post

Protecting & Securing Your Critical Data

Considering 93 percent of companies file for bankruptcy within 12 months of a disaster that blocked access to their data for 10 days or more, planning for the worst is just smart business. Learn how Acronis Backup integrates security at every stage

This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…

Keep in touch with Experts Exchange

Tech news and trends delivered to your inbox every month