Solved

SYSLOGD

Posted on 2003-11-19
4
456 Views
Last Modified: 2010-04-21
hi,
i previously asked about the SYSLOGD in Linux that how can i monitor the network  and this was the solution provided by SUNNYCODER.

"
In the syslog.conf comment all entries and all a line

*.*       @hostname_of_linux_machine_or_the_IP_address

next restart syslogd with -r option
on the linux machine on which you would be receiving logs, add configuration in syslog.conf .. this will decide which messages go in which directory ... if you are happy with the default, then do not touch it

restart syslogd with -r option "

 Now I wanna ask that how can i mentain the daily file ( separate files for daily logs date wise ). is there any method of doing that. Simply how can i manage the logs in separate files.
thanks,

0
Comment
Question by:atiqahmed
4 Comments
 

Accepted Solution

by:
rayktrz earned 30 total points
ID: 9798365
The log files should already be being rotated on a weekly basis, by using logrotate under cron control.

In Redhat the cron file is /etc/cron.daily/logrotate,
which uses the configuration file /etc/logrotate.conf,
which in turn includes additional configurations from the files /etc/logrotate.d/*

edit all the config files, changing weekly to daily, where required. Also, if you have an extra log file that this is require for, then add a new configuration in /etc/logrotate.d, or add it to the list in /etc/logrotate.d/syslog.

the default nuber of 'old' copies stored is 4, you may want to increase this by adding the parameter 'rotate 30', or whatever, to the appropriate configuration (probably  /etc/logrotate.d/syslog)
0
 
LVL 44

Expert Comment

by:Karl Heinz Kremer
ID: 10303658
No comment has been added lately, so it's time to clean up this TA.
I will leave a recommendation in the Cleanup topic area that this question is:
Answered by rayktrz
Please leave any comments here within the next four days.

PLEASE DO NOT ACCEPT THIS COMMENT AS AN ANSWER!

khkremer
EE Cleanup Volunteer
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Introduction We as admins face situation where we need to redirect websites to another. This may be required as a part of an upgrade keeping the old URL but website should be served from new URL. This document would brief you on different ways ca…
The purpose of this article is to show how we can create Linux Mint virtual machine using Oracle Virtual Box. To install Linux Mint we have to download the ISO file from its website i.e. http://www.linuxmint.com. Once you open the link you will see …
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:

707 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now