Solved

kiwi syslog and pix 525 logs getting spuratic events

Posted on 2006-11-26
6
265 Views
Last Modified: 2010-04-11
I've been looking through my syslogs and noticed that huge chucks of log times are missing. It starts at 2am ends at 2:32:27 then picks up at 8:46:11 ends at 8:47:36 then picks back up at 15:01:23 and ends a minute later.  This happens off and on.  Why is it doing this? All these times are in the same log file and I have it regenerate a new file every day. My files are between 800k and 4MB varying.
0
Comment
Question by:Fubyou
  • 2
  • 2
6 Comments
 
LVL 38

Expert Comment

by:Rich Rumble
Comment Utility
Have you tried using a Linux machine instead or possibly another syslog daemon product? http://www.winsyslog.com/en/ The trial version should be enough to test with to see if its the server (syslog) itself or if it's the kiwi tools. http://www.sysrose.com/
Is this server set to get automatic updates, it might have something to do with this, a network driver update might knock the computer off the network for a minute or two, and a slow shutdown/reboot might last for a few minutes depending on how long the bios/scsi boot takes... Just guessing...
-rich
0
 

Author Comment

by:Fubyou
Comment Utility
The machine is on a network that doesn't have internet. I didn't want to use linux because getting the logs off is yet another learning curve. But ill try another deamon. Do these syslog deamons have unlimited space for logs or at least can filter out junk from good data. I dont care about analyzing because analyzing costs money and I just want to use log parser for that.
0
 
LVL 38

Expert Comment

by:Rich Rumble
Comment Utility
They can write log's of any size, as much room as you give them is what they can take up. I've not used other deamons, but from the reviews they sound comparable to others like Kiwi.
-rich
0
 

Author Comment

by:Fubyou
Comment Utility
I figured it out. The machine was shutting off the hard disk with some power saving feature. Sorry for the late answer.
0
 

Accepted Solution

by:
RomMod earned 0 total points
Comment Utility
Question closed - 500 points refunded.

Best regards,
RomMod
Experts Exchange
Community Support Moderator
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Suggested Solutions

Password hashing is better than message digests or encryption, and you should be using it instead of message digests or encryption.  Find out why and how in this article, which supplements the original article on PHP Client Registration, Login, Logo…
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Access reports are powerful and flexible. Learn how to create a query and then a grouped report using the wizard. Modify the report design after the wizard is done to make it look better. There will be another video to explain how to put the final p…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now