Solved

Logwatch messages file

Posted on 2013-05-10
3
173 Views
Last Modified: 2013-05-15
I'd like to change where the logwatch directory is placed - and limit it's size.  

Right now it's going into the /var/tmp area - which is set to 500MB.  The file size, however, will often exceed that (another issue altogether) - causing the tmp directory to fill up and consequently glitching out other things like MySQL.

I'd like to redirect it to another place (any directory - suggestions?) and limit it's file size to maybe 50-80MB.

How would I go about doing that?  :)

Thanks in advance -
0
Comment
Question by:erzoolander
  • 2
3 Comments
 
LVL 1

Author Comment

by:erzoolander
Comment Utility
Edit -

I think I know what's going on - so need to edit the question a bit.

What's happening, I believe, is that logwatch is attempting to process the log files.  During that process - it's filling up the tmp directory, at which point it fails - and therefore can't finish the process and/or clean up after itself.  So - it's leaving all it's work-in-progress crap sitting in tmp - undeleted.

So - limiting the file size (unless I'm limiting the file size of the /var/log file being analyzed) isn't the solution (and that might be one).

Rather - the solution appears to be that it needs to output to a different directory other than /var/tmp.

...and if so - how to do that?

I see a TmpDir = /tmp variable in the logwatch.conf file.  Is it that?  (and shouldn't it be /var/tmp - or is the /var assumed?)
0
 
LVL 28

Accepted Solution

by:
Jan Springer earned 500 total points
Comment Utility
It should be /tmp and I don't see why you can't change it.
0
 
LVL 1

Author Closing Comment

by:erzoolander
Comment Utility
That ended up being the solution.  I simply redirected the output for logwatch to an alternate directory (that had no file size restriction) and that cleared up the issue altogether.
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

If you are running a LAMP infrastructure, this little code snippet is very helpful if you are serving lots of HTML, JavaScript and CSS-related information. The mod_deflate module, which is part of the Apache 2.2 application, provides the DEFLATE…
Hi, in this article I'm going to teach you how to run your own site, and how to let people in (without IP). I'll talk about and explain each step... :) By the way, everything in this Tutorial is completely free and legal. This article is for …
Excel styles will make formatting consistent and let you apply and change formatting faster. In this tutorial, you'll learn how to use Excel's built-in styles, how to modify styles, and how to create your own. You'll also learn how to use your custo…
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…

771 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now