Please contact your support team if you have a question or need assistance for any Rackspace products, services, or articles.
What Linux Logs do what, and where are they?
This article will identify what is in each of your logs and where they are and what distro certain logs are associated with.
Unless specified otherwise in the below log description you can use vi,less,tail, or cat to look at this info.
Alternitive logs information from update-alternatives into this log file.
Access Log file records incoming requests and all requests processed by apache. Such as HTTP get and post requests.These logs can be parsed by log parsers such as awstats or webalizer. This is configurable by the CustomLog directive.
All Apache errors and diagnostic information found while serving requests are stored here. Location of the error.log file is set by ErrorLog Directive.
Stores information from Linux Audit deamon (auditd). This log contains information on what users perform read/writes to . An example is you can determine who changed a specific file.
Contains system authorization information, including user logins and authentication machinsm that were used.
Contains information pertaining to the boot process after the kernel has loaded. Information such as system file check, mounting of the filesystem, starting firewall, starting network devices and starting services.
This will contain failed login attempts. Use the 'last' command to view this log. Example: last -f /var/log/btmp |more
When crondaemon or anacron starts a cron job the information the information about the cron job is stored here.
Contains Kernel information about hardware and devices detected during the boot process. This file is overwritten when new messages are sent to it. Example: the next boot.
This has information that is logged when a package is installed or removed using the dpkg command.
Log file contains user failed login attempts. faillog is a command that access's the information.
/var/log/kern.log (Ubuntu/Deb, can be configured for Centos/Redhat)
kern.log contains the logging from the kernels initialization at system bootup, as well as any kernel errors or informational messages that are sent from the kernel
Displays recent login information. This is a command that is run to view the information provided.
Information from the mail server that is running on your system. Example Sendmail logging information.
Same information as Maillog.log for Centos/Redhat flavors.
This folder will contain additional logs provided by your mail server. Example: sendmail stores collected mail statistics in /var/log/mail/statistics.
Contains global system messages, including the messages logged during boot. Several things are logged in this file including mail, cron, daemon, kern, auth, etc.
Contains daily sar files collected by sysstat package.
/var/log/samba/ Contains log information stored by samba daemon. Used to connect to windows/linux filesystems.
SELinux uses setroubleshootd (SE Trouble Shoot Daemon) to notify about issues in the security context of files, and logs those information in this log file.
Information related to Authentication and authorization privileges. Exmample sshd logs all information here including unsuccessful attempts.
var/log/wtmp or /var/log/utmp
Contains login records. Using wtmp you can find out who is logged into the system. who command uses this file to display the information.
Information that is logged when a package is installed or removed is stored here.
Linux logs are the association of the alternative that for the diagnostic and for the configurable that presses audit. Storing of the linux to save from bestessays.com scam are synthetic of the files that where to them have been brought.
This article is much helpful to understand about Linux Logs where they are and what distro certain logs are associated with. Each of them is very clearly explained in this article and thanks for this informative article. cheap cable companies
I have gone through the steps which you have shared here and it works well actually. I have been searching for this piece of information. Hope everyone will make use of it.keep share more similar stuff here. tv providers
Lots of companies will rent you access to their raw computing infrastructure. It takes a wide variety of specialized engineering skills to architect and manages not only the infrastructure but also the many complex tools and applications that run on top of it, including the latest data engines and e-commerce platforms. best place to buy diamond rings