What about errors in my Apples and Penguins

Slides:



Advertisements
Similar presentations
Extern name server - translates addresses of s messages - enables users to use aliases - … ID cards system - controls entrance to buildings,
Advertisements

Chapter 11 Syslog and Log Rotate. Computer Center, CS, NCTU 2 Log files  Execution information of each services sshd log files httpd log files ftpd log.
Creating WordPress Websites. Creating a site on your computer Local server Local WordPress installation Setting Up Dreamweaver.
Syslogd Tracking system events. Log servers Applications are constantly encountering events which should be recorded –users attempt to login with bad.
Linux presentation A basic introduction.
Linux/Bash Commands Damian Gordon. ls List all the visible files in the current folder.
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
1 Mapping a Drive on the USF IIS Server. 2 Mapping a Drive To map a drive to a network file directory in Windows you must be on a Microsoft local area.
Open Source Software WampServer Presented By Mr. R.Aravindhan.
Linux System Administration LINUX SYSTEM ADMINISTRATION.
Guide to Operating System Security Chapter 12 Security through Monitoring and Auditing.
Hosting Control Panels Allows users to manage their various hosted services in single place.  Creating webspaces  Creating FTP accounts  Creating .
Services, logging, accounting Todd Kelley CST8177– Todd Kelley1.
Syslog and log files Ameera Jaradat.
ITE 1 Chapter 5. Chapter 5 is a Large Chapter It has a great deal of useful information about operating systems. You will find this VERY helpful when.
CIS 218 Advanced UNIX 1 User and System Information CIS 218.
The EPIKH Project (Exchange Programme to advance e-Infrastructure Know-How) VOMS Installation and configuration Bouchra
Course Pretest Today you will be taking a pretest for our course. The same test will be given to you again shortly before midterms and again at the end.
ITI-481: Unix Administration Meeting 5. Today’s Agenda Network Information Service (NIS) The Cron Program Syslogd and Logging.
7 November 2005 Sebastian Büttrich ItrainOnline MMTK 1 Linux logging and logfiles monitoring with swatch Sebastian Büttrich, wire.less.dk.
Copyright 2009 Trend Micro Inc. Classification 9/23/ Troubleshooting TMSP Marks Shen Senior Engineer – QA Evan Wang Engineer - QA.
SCSC 455 Computer Security Chapter 4 File Security.
ITI-481: Unix Administration Meeting 5 Christopher Uriarte Rutgers University Center for Applied Computing Technologies.
CIS 450 – Network Security Chapter 16 – Covering the Tracks.
System logging and monitoring
Environmental Genomics Thematic Programme Data Centre Advanced Bio-Linux Dan Swan: Log files and log monitoring.
Ways to manage DB in MySQL cs346. Six ways to CREATE and INSERT INTO tables Modelocalremotelocalremotewindow WhereMysql console Putty; Mysql console Mysql.
TELE 301 Lecture 10: Scheduled … 1 Overview Last Lecture –Post installation This Lecture –Scheduled tasks and log management Next Lecture –DNS –Readings:
Day 11 SAMBA NFS Logs Managing Users. SAMBA Implements the ability for a Linux machine to communicate with and act like a Windows file server. –Implements.
Backups, Logging, Troubleshooting. Dates for Last Week of Class Homework 7 – Due Tuesday 5/1 by midnight Labs 7 & 8 – 8 is extra credit – Due Thursday.
Security for Administrators Presented by: Greg Smith Pacsec.jp 2004.
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 6 Manage Linux Processes and Services.
Linux Security. See who's logged in 1) w (more information) 2) who (less information)
CENT 305 Information Systems Security Overview of System Logging syslog 1.
Manage Directories and Files in Linux. 2 Objectives Understand the Filesystem Hierarchy Standard (FHS) Identify File Types in the Linux System Change.
Syslog and Log Rotate. Computer Center, CS, NCTU 2 Log files  Execution information of each services sshd log files httpd log files ftpd log files 
General rules 1. Rule: 2. Rule: 3. Rule: 10. Rule: Ask questions ……………………. 11. Rule: I do not know your skill. If I tell you things you know, please stop.
1350 TAC Training © 2000, Cisco Systems, Inc. Wireless Lab.
Administration Utilities Objectives –to use standard administration utilities Contents –manual pages –identifying your system –communicating with Users.
Linux services troubleshooting. If you cannot connect to your service.. When you start service, check that it says ok (most services say that when starting.
Cosc 4750 Log files Logging policies Throw away all data immediately Reset log files at periodic intervals Rotate logs files, keeping data for a fixed.
Review Please hand in any homework and practicals Vim Scripting Inter-device communication.
Securing Linux By Terrance Marcelle.
Apache, MySQL and PHP Installation and Configuration Chapter 2 MySQL Installation and Configuration.
1 Dr Alexiei Dingli Web Science Stream Installing ROR.
Web Server Administration Chapter 11 Monitoring and Analyzing the Web Environment.
ITI-481: Unix Administration Meeting 5 Christopher Uriarte Rutgers University Center for Applied Computing Technologies.
Isecur1ty training center Presented by : Eng. Mohammad Khreesha.
Don’t look at Me!. There are situation when you don’t want search engines digging through some files or indexing some pages. You create a file in the.
Introduction to Linux Server Setup Jonathan Hood CSE 4000 Practical Issues in Software Engineering.
Holly Cate January 20, 2010 Main Bioinformatics Laboratory.
Web Server Administration Chapter 11 Monitoring and Analyzing the Web Environment.
COP 4343 Unix System Administration
Cosc 4750 Log files.
UBUNTU INSTALLATION
ITIS 3110 IT Infrastructure II
Syslog and Log Rotate yihshih arr. by pschiu.
By Jonathan Rinfret CREATING A BASH SCRIPT By Jonathan Rinfret
Admin Tutorial.
Cloud based Open Source Backup/Restore Tool
John Carelli, Instructor Kutztown University
ms vısual studıo 2008-Introductıon TUTORIAL
Syslog and Log Rotate yihshih.
LINUX SYSTEM ADMINISTRATION
Chapter 11 Syslog And Log Files
CIT 485: Advanced Cybersecurity
CIT 470: Advanced Network and System Administration
Syslog and Log Rotate.
Syslog and Log Rotate.
Homework 8 Operating Systems CS 3430 Sarah Diesburg.
Presentation transcript:

What about errors in my Apples and Penguins

less /var/log/messages

Commands Go to /var/logs directory: –# cd /var/logs View common log file /var/log/messages using any one of the following command: –# tail -f /var/log/messages # less /var/log/messages # more -f /var/log/messages # vi /var/log/messages

Common Linux log files name and usage /var/log/message: General message and system related stuff /var/log/auth.log: Authenication logs /var/log/kern.log: Kernel logs /var/log/cron.log: Crond logs (cron job) /var/log/maillog: Mail server logs /var/log/qmail/ : Qmail log directory (more files inside this directory) /var/log/httpd/: Apache access and error logs directory /var/log/lighttpd: Lighttpd access and error logs directory /var/log/boot.log : System boot log /var/log/mysqld.log: MySQL database server log file /var/log/secure: Authentication log /var/log/utmp or /var/log/wtmp : Login records file /var/log/yum.log: Yum log files

Logs on an Apple Console –Spotlight Or –Applications -> Utilities folder

Main logs to look at: system.log describes issues regarding your whole system. DNS, networking, and Adium messages frequently appear here for me. mail.log is occasionally useful when trying to get the Mail application straightened out. CrashReporter logs are very important in debugging any crash within a specific application.