- 4 Ways to Watch or Monitor Log Files in Real Time
- 1. tail Command – Monitor Logs in Real Time
- 2. Multitail Command – Monitor Multiple Log Files in Real Time
- 3. lnav Command – Monitor Multiple Log Files in Real Time
- 4. less Command – Display Real Time Output of Log Files
- If You Appreciate What We Do Here On TecMint, You Should Consider:
- 12 Critical Linux Log Files You Must be Monitoring
- What are Linux log files
- Why monitor Linux log files
- Which Linux log files to monitor
- /var/log/ messages
- What’s logged here?:
- How can I use these logs?:
- /var/log/auth.log
- What’s logged here?
- How can I use these logs?:
- /var/log/secure
- What’s logged here?
- How can I use these logs?:
- /var/log/boot.log
- What’s logged here?
- How can I use these logs?:
- /var/log/dmesg
- What’s logged here?
- How can I use these logs?:
- /var/log/kern.log
- What’s logged here?
- How can I use these logs?:
- /var/log/faillog
- What’s logged here?
- How can I use these logs?:
- /var/log/cron
- What’s logged here?
- How can I use these logs
- /var/log/yum.log
- What’s logged here?
- How can I use these logs?:
- /var/log/maillogor /var/log/mail.log
- What’s logged here?
- How can I use these logs?
- var/log/httpd/
- What’s logged here?
- How can I use these logs?:
- /var/log/mysqld.log or /var/log/mysql.log
- What’s logged here?
- How can I use this log?
- Final Takeaway
4 Ways to Watch or Monitor Log Files in Real Time
How can I see the content of a log file in real time in Linux? Well there are a lot of utilities out there that can help a user to output the content of a file while the file is changing or continuously updating. Some of the most known and heavily used utility to display a file content in real time in Linux is the tail command (manage files effectively).
1. tail Command – Monitor Logs in Real Time
As said, tail command is the most common solution to display a log file in real time. However, the command to display the file has two versions, as illustrated in the below examples.
In the first example the command tail needs the -f argument to follow the content of a file.
Monitor Apache Logs in Real Time
The second version of the command is actually a command itself: tailf. You won’t need to use the -f switch because the command is built-in with the -f argument.
Real Time Apache Logs Monitoring
Usually, the log files are rotated frequently on a Linux server by the logrotate utility. To watch log files that get rotated on a daily base you can use the -F flag to tail command.
The tail -F will keep track if new log file being created and will start following the new file instead of the old file.
However, by default, tail command will display the last 10 lines of a file. For instance, if you want to watch in real time only the last two lines of the log file, use the -n file combined with the -f flag, as shown in the below example.
Watch Last Two Lines of Logs
2. Multitail Command – Monitor Multiple Log Files in Real Time
Another interesting command to display log files in real time is multitail command. The name of the command implies that multitail utility can monitor and keep track of multiple files in real time. Multitail also lets you navigate back and forth in the monitored file.
To install mulitail utility in Debian and RedHat based systems issue the below command.
To display the output of two log file simultaneous, execute the command as shown in the below example.
Multitail Monitor Logs
3. lnav Command – Monitor Multiple Log Files in Real Time
Another interesting command, similar to multitail command is the lnav command. Lnav utility can also watch and follow multiple files and display their content in real time.
To install lnav utility in Debian and RedHat based Linux distributions by issuing the below command.
Watch the content of two log files simultaneously by issuing the command as shown in the below example.
lnav – Real Time Logs Monitoring
4. less Command – Display Real Time Output of Log Files
Finally, you can display the live output of a file with less command if you type Shift+F .
As with tail utility, pressing Shift+F in a opened file in less will start following the end of the file. Alternatively, you can also start less with less +F flag to enter to live watching of the file.
Watch Logs Using Less Command
That’s It! You may read these following articles on Log monitoring and management.
In this article, we showed how to watch data being appended in log files in real-time on the terminal in Linux. You can ask any questions or share your thoughts concerning this guide via the comment form below.
If You Appreciate What We Do Here On TecMint, You Should Consider:
TecMint is the fastest growing and most trusted community site for any kind of Linux Articles, Guides and Books on the web. Millions of people visit TecMint! to search or browse the thousands of published articles available FREELY to all.
If you like what you are reading, please consider buying us a coffee ( or 2 ) as a token of appreciation.
We are thankful for your never ending support.
Источник
12 Critical Linux Log Files You Must be Monitoring
Log files are the records that Linux stores for administrators to keep track and monitor important events about the server, kernel, services, and applications running on it. In this post, we’ll go over the top Linux log files server administrators should monitor.
- Share on Facebook
- Share on Twitter
- Share on Linkedin
- Send email
What are Linux log files
Log files are a set of records that Linux maintains for the administrators to keep track of important events. They contain messages about the server, including the kernel, services and applications running on it.
Linux provides a centralized repository of log files that can be located under the /var/log directory.
The log files generated in a Linux environment can typically be classified into four different categories:
- Application Logs
- Event Logs
- Service Logs
- System Logs
Why monitor Linux log files
Log management is an integral part of any server administrator’s responsibility.
By monitoring Linux log files, you can gain detailed insight on server performance, security, error messages and underlying issues by. If you want to take a proactive vs. a reactive approach to server management, regular log file analysis is 100% required.
In short, log files allow you to anticipate upcoming issues before they actually occur.
Which Linux log files to monitor
Monitoring and analyzing all of them can be a challenging task.
The sheer volume of logs can sometimes make it frustrating just to drill down and find the right file that contains the desired information.
To make it a little easier for you, we will introduce you to some of the most critical Linux log files that you must be monitoring.
/var/log/ messages
What’s logged here?:
- This log file contains generic system activity logs.
- It is mainly used to store informational and non-critical system messages.
- In Debian-based systems, /var/log/syslog directory serves the same purpose.
How can I use these logs?:
- Here you can track non-kernel boot errors, application-related service errors and the messages that are logged during system startup.
- This is the first log file that the Linux administrators should check if something goes wrong.
- For example, you are facing some issues with the sound card. To check if something went wrong during the system startup process, you can have a look at the messages stored in this log file.
/var/log/auth.log
What’s logged here?
- All authentication related events in Debian and Ubuntu server are logged here.
- If you’re looking for anything involving the user authorization mechanism, you can find it in this log file.
How can I use these logs?:
Suspect that there might have been a security breach in your server? Notice a suspicious javascript file where it shouldn’t be? If so, then find this log file asap!
- Investigate failed login attempts
- Investigate brute-force attacks and other vulnerabilities related to user authorization mechanism.
/var/log/secure
What’s logged here?
RedHat and CentOS based systems use this log file instead of /var/log/auth.log.
- It is mainly used to track the usage of authorization systems.
- It stores all security related messages including authentication failures.
- It also tracks sudo logins, SSH logins and other errors logged by system security services daemon.
How can I use these logs?:
- All user authentication events are logged here.
- This log file can provide detailed insight about unauthorized or failed login attempts
- Can be very useful to detect possible hacking attempts.
- It also stores information about successful logins and tracks the activities of valid users.
/var/log/boot.log
What’s logged here?
- The system initialization script, /etc/init.d/bootmisc.sh, sends all bootup messages to this log file
- This is the repository of booting related information and messages logged during system startup process.
How can I use these logs?:
- You should analyze this log file to investigate issues related to improper shutdown, unplanned reboots or booting failures.
- Can also be useful to determine the duration of system downtime caused by an unexpected shutdown.
/var/log/dmesg
What’s logged here?
- This log file contains Kernel ring buffer messages.
- Information related to hardware devices and their drivers are logged here.
- As the kernel detects physical hardware devices associated with the server during the booting process, it captures the device status, hardware errors and other generic messages.
How can I use these logs?:
- This log file is useful for dedicated server customers mostly.
- If a certain hardware is functioning improperly or not getting detected, then you can rely on this log file to troubleshoot the issue.
- Or, you can purchase a managed server from us and we’ll monitor it for you.
/var/log/kern.log
What’s logged here?
This is a very important log file as it contains information logged by the kernel.
How can I use these logs?:
- Perfect for troubleshooting kernel related errors and warnings.
- Kernel logs can be helpful to troubleshoot a custom-built kernel.
- Can also come handy in debugging hardware and connectivity issues.
/var/log/faillog
What’s logged here?
This file contains information on failed login attempts.
How can I use these logs?:
It can be a useful log file to find out any attempted security breaches involving username/password hacking and brute-force attacks.
/var/log/cron
What’s logged here?
This log file records information on cron jobs.
How can I use these logs
- Whenever a cron job runs, this log file records all relevant information including successful execution and error messages in case of failures.
- If you’re having problems with your scheduled cron, you need to check out this log file.
/var/log/yum.log
What’s logged here?
It contains the information that is logged when a new package is installed using the yum command.
How can I use these logs?:
- Track the installation of system components and software packages.
- Check the messages logged here to see whether a package was correctly installed or not.
- Helps you troubleshoot issues related to software installations.
Suppose your server is behaving unusually and you suspect a recently installed software package to be the root cause for this issue. In such cases, you can check this log file to find out the packages that were installed recently and identify the malfunctioning program.
/var/log/maillog or /var/log/mail.log
What’s logged here?
All mail server related logs are stored here.
How can I use these logs?
- Find information about postfix, smtpd, MailScanner, SpamAssassain or any other email related services running on the mail server.
- Track all the emails that were sent or received during a particular period
- Investigate failed mail delivery issues.
- Get information about possible spamming attempts blocked by the mail server.
- Trace the origin of an incoming email by scrutinizing this log file.
var/log/httpd/
What’s logged here?
- This directory contains the logs recorded by the Apache server.
- Apache server logging information are stored in two different log files – error_log and access_log.
How can I use these logs?:
- The error_log contains messages related to httpd errors such as memory issues and other system related errors.
- This is the place where Apache server writes events and error records encountered while processing httpd requests.
- If something goes wrong with the Apache webserver, check this log for diagnostic information.
- Besides the error-log file, Apache also maintains a separate list of access_log.
- All access requests received over HTTP are stored in the access_log file.
- Helps you keep track of every page served and every file loaded by Apache.
- Logs the IP address and user ID of all clients that make connection requests to the server.
- Stores information about the status of the access requests, – whether a response was sent successfully or the request resulted in a failure.
/var/log/mysqld.log or /var/log/mysql.log
What’s logged here?
- As the name suggests, this is the MySQL log file.
- All debug, failure and success messages related to the [mysqld] and [mysqld_safe] daemon are logged to this file.
- RedHat, CentOS and Fedora stores MySQL logs under /var/log/mysqld.log, while Debian and Ubuntu maintains the log in /var/log/mysql.log directory.
How can I use this log?
- Use this log to identify problems while starting, running, or stopping mysqld.
- Get information about client connections to the MySQL data directory
- You can also setup ‘long_query_time’ parameter to log information about query locks and slow running queries.
Final Takeaway
While monitoring and analyzing all the log files generated by the system can be a difficult task, you can make use of a centralized log monitoring tool to simplify the process.
Some of our customers take advantage of using Nagios Log Server to manage their server logs. There are many opensource options available if that’s out of the budget. Needless to say though, monitoring Linux logs manually is hard.
So if you want to take a truly proactive approach to server management, investing in a centralized log collection and analysis platform which allows you to view log data in real-time and set up alerts to notify you when potential threats arise.
Источник