Solved

Best way to clean /var/wtmpx file

Posted on 2012-04-10
5
1,937 Views
Last Modified: 2012-05-08
Hi Expert,

I have a small soalris 10 machine that the /var is getting full, and noticed the /var/adm/wtmpx file is pretty big.
what's the best way to clean it up without disrupting, or losing function? can this be done while having users login without losing there session?

The OS is Solaris 10.

Thanks in Advance.

B4
0
Comment
Question by:bbbb44
  • 3
  • 2
5 Comments
 
LVL 16

Expert Comment

by:Joseph Gan
ID: 37831028
From the "man wtmpx":
...
The utmpx  database  contains  user  access  and  accounting
     information  for  commands  such  as  who(1),  write(1), and
     login(1). The wtmpx database contains the  history  of  user
     access and accounting information for the  utmpx database.
...

What you could do is, stop utmpd (utmpx monitoring daemon):
# /etc/init.d/utmpd stop

Then, you can move or delete ( depands on what you want to do with the database ) the file. And touch a new file, then restart the daemon.

You can do this at any time, won't losing any users login and sessions. Only will lose some accounting information during which the daemon is shut down.
0
 

Author Comment

by:bbbb44
ID: 37831048
Hi Ganjos,

Thanks for the response.

would doing the #echo "" /var/adm/utmpx command provides the same result as your method? any consequence to the users that are currently login with this command?

Thanks,

B4
0
 
LVL 16

Expert Comment

by:Joseph Gan
ID: 37831057
Hey, this command will clean up the utmpx file, so you will lost all the accounting information, other than that no consequence what so ever to the users login.
0
 
LVL 16

Accepted Solution

by:
Joseph Gan earned 500 total points
ID: 37831063
But the command is "echo '" > /var/adm/utmpx" or "echo "' > /var/adm/wtmpx"
0
 

Author Comment

by:bbbb44
ID: 37831065
Thanks ganjos, I'll run the >/var/adm/wtmpx command to clear the file.

Thx,

Brownson
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction Regular patching is part of a system administrator's tasks. However, many patches require that the system be in single-user mode before they can be installed. A cluster patch in particular can take quite a while to apply if the machine…
Using libpcap/Jpcap to capture and send packets on Solaris version (10/11) Library used: 1.      Libpcap (http://www.tcpdump.org) Version 1.2 2.      Jpcap(http://netresearch.ics.uci.edu/kfujii/Jpcap/doc/index.html) Version 0.6 Prerequisite: 1.      GCC …
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now