COP 4343 Unix System Administration

Slides:



Advertisements
Similar presentations
CIS Lesson 12 System Monitoring 1. CIS Lesson 12 System Monitoring Monitoring Log Files /var/log ‒ Can be used as indication of systematic.
Advertisements

Managing logs with syslog-ng and SWATCH AfNOG 11, Kigali/Rwanda.
NetComm Wireless Logging Architecture Feature Spotlight.
Syslog and log files1-1 Syslog and Log Files  From logfiles, you can find m important information m History m Errors/warnings  Logging policies m Reset.
Detecting Intruders from log files and traces Special Intruder Detection Systems (IDS) are now a market niche, and there are many products on the market.
CIS 193A – Lesson3 Vigilance! Logging & Monitoring Syslog Logrotate Logwatch Accounting.
Chapter 11 Syslog and Log Rotate. Computer Center, CS, NCTU 2 Log files  Execution information of each services sshd log files httpd log files ftpd log.
Syslogd Tracking system events. Log servers Applications are constantly encountering events which should be recorded –users attempt to login with bad.
Information Networking Security and Assurance Lab National Chung Cheng University Investigating Unix System.
Linux+ Guide to Linux Certification, Second Edition
NOC TOOLS syslog AfNOG Cairo, SI-E, 2 of 5 Sunday Folayan.
1 COP 4343 Unix System Administration Unit 16: file server – samba.
Services, logging, accounting Todd Kelley CST8177– Todd Kelley1.
Syslog and log files Ameera Jaradat.
CGI Common Gateway Interface. CGI is the scheme to interface other programs to the Web Server.
Va-scanCopyright 2002, Marchany Securing Solaris Servers Randy Marchany.
New SA Training Topic 9: Logging, Monitoring, and Performance  Logging  Windows – “Auditing”  Linux – syslog  Monitoring  MRTG  Big Brother  Performance.
CIS 218 Advanced UNIX 1 User and System Information CIS 218.
System Monitoring and Automation CSCI N321 – System and Network Administration Copyright © 2000, 2011 by Scott Orr and the Trustees of Indiana University.
7 November 2005 Sebastian Büttrich ItrainOnline MMTK 1 Linux logging and logfiles monitoring with swatch Sebastian Büttrich, wire.less.dk.
System logging and monitoring
Vodafone MachineLink 3G
Environmental Genomics Thematic Programme Data Centre Advanced Bio-Linux Dan Swan: Log files and log monitoring.
Introduction to Linux ( I ) Sidney Fong 4 th Feb 2006.
System Monitoring and Automation. 2 Section Overview Automation of Periodic Tasks Scheduling and Cron Syslog Accounting.
TELE 301 Lecture 10: Scheduled … 1 Overview Last Lecture –Post installation This Lecture –Scheduled tasks and log management Next Lecture –DNS –Readings:
Day 11 SAMBA NFS Logs Managing Users. SAMBA Implements the ability for a Linux machine to communicate with and act like a Windows file server. –Implements.
Backups, Logging, Troubleshooting. Dates for Last Week of Class Homework 7 – Due Tuesday 5/1 by midnight Labs 7 & 8 – 8 is extra credit – Due Thursday.
CIS 290 LINUX Security Tripwire file integrity and change management tool and log monitoring.
Guide to Linux Installation and Administration, 2e1 Chapter 10 Managing System Resources.
Linux+ Guide to Linux Certification, Third Edition
CS 390 Unix Programming Summer Unix Programming - CS 3902 Course Details Online Information Please check.
CS 390 Unix Programming Environment Summer Suchindra Rengan - CS3902 Course Details Instructors Suchindra Rengan – ‘sachin’ ( Section 001)
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 6 Manage Linux Processes and Services.
Generating Reports and Analyzing Logs 黃雁亭 陳麗雯 廖榆恬 1.
CENT 305 Information Systems Security Overview of System Logging syslog 1.
Ch11: Syslog and Logfiles Presented by: Apichana Thiantanawat 06/11/02.
1 Periodic Processes and the cron Daemon The cron daemon is where all timed events are initiated. The cron system is serviced by the cron daemon. What.
Syslog and Log Rotate. Computer Center, CS, NCTU 2 Log files  Execution information of each services sshd log files httpd log files ftpd log files 
CS4710 Why Progam?. Why learn to program? Utility of programming skills: understand tools modify tools create your own automate repetitive tasks automate.
Guide to Linux Installation and Administration, 2e1 Chapter 11 Using Advanced Administration Techniques.
Core System Services. INIT Daemon The init process is the patron of all processes. first process that gets started in any Linux/ UNIX -based system.
1 LINUX SECURITY. 2 Outline Introduction Introduction - UNIX file permission - UNIX file permission - SUID / SGID - SUID / SGID - File attributes - File.
Cosc 4750 Log files Logging policies Throw away all data immediately Reset log files at periodic intervals Rotate logs files, keeping data for a fixed.
TOPIC 7.0 LINUX SERVICES AND CONFIGURATION. ROOT USER Root user is called “super user” because it has power far beyond those of mortal user. As root,
Lecture 02 File and File system. Topics Describe the layout of a Linux file system Display and set paths Describe the most important files, including.
Planning, configuring, running and maintaining a web server -1.
University of Kansas Department of Electrical Engineering and Computer Science Dr. Susan Gauch April 21, 2005 I T T C Introduction to Web Technologies.
Linux Administration – Finding You Way on the Command Line The Linux File Directory or Tree.
9/21/04 James Gallagher Server Installation and Testing: Hands-on ● Install the CGI server with the HDF and FreeForm handlers ● Link data so the server.
The Linux Kernel About 6 million lines of code
CGI, FORMS and Perl CSC 3750 Fall
COP 4343 Unix System Administration
Cosc 4750 Log files.
APRICOT 2008 Network Management Taipei, Taiwan February 20-24, 2008
CGI I: Basics Web Programming.
ITIS 3110 IT Infrastructure II
Introduction to Programming the WWW I
Log management AfNOG 2008 Rabat, Morocco.
CGI Programming Part II UNIX Security
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
Operating Systems Lecture 4.
Syslog and Log Rotate yihshih.
LINUX SYSTEM ADMINISTRATION
Chapter 11 Syslog And Log Files
CIT 485: Advanced Cybersecurity
CIT 470: Advanced Network and System Administration
Syslog and Log Rotate.
Syslog and Log Rotate.
CGI I: Basics Web Programming.
Presentation transcript:

COP 4343 Unix System Administration Unit 7: system logs benchmarks

Log files /var/log subdirectories: also: lastlog, wtmp boot.log cron dmesg maillog messages rpmpkgs secure spooler up2date Xorg.0.log yum.log subdirectories: cups gdm httpd access_log error_log mail ppp samba squid vbox also: lastlog, wtmp

syslogd and klogd syslog.conf syntax: facility.priority action

syslog facilities Meaning kern Linux kernel user user process mail mail system lpr printer system auth system that checks security deamon any other service process local0 ... local7 site specific ... news, uucp, mark many more

syslog priorities Meaning emerg imminent system crash alert condition that must be corrected immediately crit hardware problem err ordinary error warning warning of potential problem notice alert of condition that is not error info informational message debug debugging message none don’t report anything

syslog priorities priorities have ascending order specified as lowest level of concern ex: kernel.info all kernel messages of priority info and higher ex: kernel.=info only “info” messages

syslog actions destination for log message file or device ex: /var/log/message ex: - /var/log/mail (no sync after write to file) user that are logged in ex: root ex: * (i.e. all users logged in) program via pipe ex: | mail -s “please check” helper@other.com syslog process running on remote host(s) ex: @loghost

Configuration File examples *.err;kern.debug;auth.notice /dev/console daemon,auth.notice /var/adm/messages lpr.* /var/adm/lpd-errs auth.* root,nosmis auth.* @prep.ai.mit.edu *.emerg * *.alert |dectalker mark.* /dev/console

Managing Log Files logrotate utility configuration maintains set of log files rotate, compress, remove, mail daily, weekly, monthly run via cron configuration /etc/logrotate.conf /etc/logrotate.d for specific installed packages

Benchmarks assess system performance Linux Benchmark Suite example: lbs.sourceforge.net example: Dhrystone measures integer calculation performance weekly task: run benchmark on your machine that is invoked via your website

Dhrystone written as C program compile with gcc to produce dhry dhry_global.h dhry_pack_1.c dhry_pack_2.c compile with gcc to produce dhry gcc dhry_pack_?.c -o dhry place into directory: /var/www/cgi-bin

Running programs via website web server standard: CGI: Common Gateway Interface Perl scripting language especially suited to process text strings tool for managing html forms may run regular Linux programs

/var/www/cgi-bin/dhry.cgi #! /usr/bin/perl use CGI qw/:standard/; $times = param('times'); print header, start_html("Result"); print(h1("Result")); die("could not execute benchmark") unless (open(LS, "./dhry $times | tail -3 |")); @lsout = <LS>; print "<PRE>\n"; foreach $name (@lsout) { chomp($name); print $name, "<br>\n"; } print "</PRE>\n"; print end_html;

html form to invoke cgi script <h3>Benchmark example</h3> <FORM action=/cgi-bin/dhry.cgi method=get> Run benchmark <input type=text name=times size=10> times <br> <input type=submit> </form>

enable cgi scripting web server configuration /etc/httpd/conf/httpd.conf AddHandler cgi-script .cgi place dhry and dhry.cgi into /var/www/cgi-bin directory