Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

syslog settings

Posted on 2008-10-20
6
Medium Priority
?
930 Views
Last Modified: 2013-12-06
I have Red Hat Linux Enterprise 5 and trying to setup a syslog server, My applications are able to send the logs to the server but either the size limit or retension is only keeping two days of logs. Also does anyone know of a good program to go through the syslog files? hopefully something free

Thanks
0
Comment
Question by:tofitadmin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 23

Accepted Solution

by:
Kamaraj Subramanian earned 672 total points
ID: 22758624
0
 

Assisted Solution

by:Cook77
Cook77 earned 664 total points
ID: 22758674
I don't understand well, but try syslog-ng and logrotate as well to store the logs and backup then. In the syslog-ng you can make filters and you can put separate log files for critical and only informal events! Look at this example:

destination df_BOROKA { file("/var/log/ssg5-BOROKA.log"); };
filter f_BOROKA {
    match("BOROKA-ssg5");
};
log {
        source(s_all);
        filter(f_BOROKA);
        destination(df_BOROKA);
};

If your syslog files contains 'BOROKA-ssg5' it will put ssg5-BOROKA.log file.
0
 
LVL 5

Assisted Solution

by:ifreq
ifreq earned 664 total points
ID: 22760131
On your server check /etc/logrotate.conf settings, you must increase the log time limit.  What kinda software you need for going through the logfiles? Usually you just "zcat logfile.tar.gz|grep value" or "grep value logfile" if its not archived.
0

Featured Post

[Webinar] Lessons on Recovering from Petya

Skyport is working hard to help customers recover from recent attacks, like the Petya worm. This work has brought to light some important lessons. New malware attacks like this can take down your entire environment. Learn from others mistakes on how to prevent Petya like worms.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In order for businesses to be compliant with certain information security laws in some countries, you need to be able to prove that a user (which user it was becomes important to the business to take action against the user after an event has occurr…
This document is written for Red Hat Enterprise Linux AS release 4 and ORACLE 10g.  Earlier releases can be installed using this document as well however there are some additional steps for packages to be installed see Metalink. Disclaimer: I hav…
How to Install VMware Tools in Red Hat Enterprise Linux 6.4 (RHEL 6.4) Step-by-Step Tutorial
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…

671 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question