Solved

syslog settings

Posted on 2008-10-20
6
927 Views
Last Modified: 2013-12-06
I have Red Hat Linux Enterprise 5 and trying to setup a syslog server, My applications are able to send the logs to the server but either the size limit or retension is only keeping two days of logs. Also does anyone know of a good program to go through the syslog files? hopefully something free

Thanks
0
Comment
Question by:tofitadmin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 23

Accepted Solution

by:
Kamaraj Subramanian earned 168 total points
ID: 22758624
0
 

Assisted Solution

by:Cook77
Cook77 earned 166 total points
ID: 22758674
I don't understand well, but try syslog-ng and logrotate as well to store the logs and backup then. In the syslog-ng you can make filters and you can put separate log files for critical and only informal events! Look at this example:

destination df_BOROKA { file("/var/log/ssg5-BOROKA.log"); };
filter f_BOROKA {
    match("BOROKA-ssg5");
};
log {
        source(s_all);
        filter(f_BOROKA);
        destination(df_BOROKA);
};

If your syslog files contains 'BOROKA-ssg5' it will put ssg5-BOROKA.log file.
0
 
LVL 5

Assisted Solution

by:ifreq
ifreq earned 166 total points
ID: 22760131
On your server check /etc/logrotate.conf settings, you must increase the log time limit.  What kinda software you need for going through the logfiles? Usually you just "zcat logfile.tar.gz|grep value" or "grep value logfile" if its not archived.
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In order for businesses to be compliant with certain information security laws in some countries, you need to be able to prove that a user (which user it was becomes important to the business to take action against the user after an event has occurr…
1. Introduction As many people are interested in Linux but not as many are interested or knowledgeable (enough) to install Linux on their system, here is a safe way to try out Linux on your existing (Windows) system. The idea is that you insta…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question