0% found this document useful (0 votes)
97 views26 pages

CSE 265: System and Network Administration

Monitoring Syslog and log files - - historical data Real-time monitoring Logging policies - what do you do with logs? Logrotate: Manage log files (c)2004-2010 Brian D. Davison monitoring motivation for monitoring Rapidly detect and fix problems Identify the source of problems Predict and avoid future problems Provide data on SA's achievements.

Uploaded by

hradiya
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views26 pages

CSE 265: System and Network Administration

Monitoring Syslog and log files - - historical data Real-time monitoring Logging policies - what do you do with logs? Logrotate: Manage log files (c)2004-2010 Brian D. Davison monitoring motivation for monitoring Rapidly detect and fix problems Identify the source of problems Predict and avoid future problems Provide data on SA's achievements.

Uploaded by

hradiya
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

CSE 265:

System and Network Administration


If you aren't measuring it, you aren't managing it.
● Service Monitoring ● Syslog and Log files

– Historical data – Logging policies – what


– Real-time monitoring do you do with logs?
● Alerting – Linux log files
● Active monitoring – Logrotate: Manage log
systems files
– End-to-end tests – Syslog: system event
– Application response logger
time monitoring – Condensing log files
Spring 2010 CSE 265: System and Network Administration ©2004-2010 Brian D. Davison
Motivation for monitoring
● Rapidly detect and fix problems
● Identify the source of problems
● Predict and avoid future problems
● Provide data on SA's achievements

Spring 2010 CSE 265: System and Network Administration ©2004-2010 Brian D. Davison
Historical data
● Historical availability
– record long-term uptime statistics
– show improvements (99.99% uptime vs 99.9%)
● Utilization data useful for capacity planning
● Process
– Poll systems at regular intervals
– Collected, often graphed
– Example: network status
● https://spot.cc.lehigh.edu/public/mrtg/internett.html

Spring 2010 CSE 265: System and Network Administration ©2004-2010 Brian D. Davison
Real-time monitoring
● Alert SA immediately about a failure
● Want to notice outage before customer does
– maintain reputation
– minimize downtime
● Two components
– Monitoring (polling) systems to check status,
watching error messages, checking subsystems
– Alerting – recognize problems and notify SAs

Spring 2010 CSE 265: System and Network Administration ©2004-2010 Brian D. Davison
Monitoring
● Want to monitor everything that can indicate
a problem
● Availability monitoring
– Host/network/application failures
● Capacity monitoring
– Approaching or past overload

Spring 2010 CSE 265: System and Network Administration ©2004-2010 Brian D. Davison
Spring 2010 CSE 265: System and Network Administration ©2004-2010 Brian D. Davison
Spring 2010 CSE 265: System and Network Administration ©2004-2010 Brian D. Davison
Spring 2010 CSE 265: System and Network Administration ©2004-2010 Brian D. Davison
Spring 2010 CSE 265: System and Network Administration ©2004-2010 Brian D. Davison
Alerting
● Monitoring useless without alerting system
● Should not depend on system being
monitored
– e.g., don't depend on e-mail if network is down
● Who gets alerts? What if failure persists?
● Need to test alerting system
– “I'm hot! I'm wet!”

Spring 2010 CSE 265: System and Network Administration ©2004-2010 Brian D. Davison
Active monitoring
● Don't just monitor and alert, do something!
● Respond quickly/automatically
● Temporary solutions
– Still need a permanent fix
● Can be a security risk (often has privileges)

Spring 2010 CSE 265: System and Network Administration ©2004-2010 Brian D. Davison
End-to-end tests
● Test entire transactions as a simulated
customer
– Send email through a server
– Log in, select an item, check-out, get receipt
● Find problems before customers
● Find systemic problems, even when
individual components are working

Spring 2010 CSE 265: System and Network Administration ©2004-2010 Brian D. Davison
Application response time monitoring

● Even when everything works, if it is too slow,


it is a failure
– Loss of productivity
– Loss of sales
– Resentment
● Use historical monitoring, too

Spring 2010 CSE 265: System and Network Administration ©2004-2010 Brian D. Davison
Summary
● Two types of monitoring:
– Historical data gathering
● Trends for capacity planning
● Recognition of long-term improvements
– Real-time monitoring and alerting
● Detect problems faster
● React before failure (e.g., before swap gets full)

Spring 2010 CSE 265: System and Network Administration ©2004-2010 Brian D. Davison
Logging policies
– Log files grow and grow – Throwing away log files
– What do you do with log ● Not recommended!
files? Some options: ● Need evidence of security
● Throw away all data problems
immediately ● Alert for hardware and
● Reset log files periodically software problems
● Rotate log files, keeping
● Ideally, keep for a month
data for a fixed time – may take that long to notice
a problem!
● Compress and archive ● Resetting when disk is full
files to tape or other media isn't good either

Spring 2010 CSE 265: System and Network Administration ©2004-2010 Brian D. Davison
Rotating log files
● Keep a fixed set of previous log files
– Rotate current file into set on a regular basis
(daily, weekly, etc.)
– Example:
#!/bin/sh
cd /var/log
mv logfile.2 logfile.3
mv logfile.1 logfile.2
mv logfile logfile.1
touch logfile
chmod 600 logfile
– May want to add compression, reset server
Spring 2010 CSE 265: System and Network Administration ©2004-2010 Brian D. Davison
Archiving log files
● May need to archive all accounting data and
log files for policy, potential audits, etc.
● First rotate on disk
– fast access to recent data
● Then write to tape or other media
● Log files should be part of backup sequence
– Hackers tend to delete them!

Spring 2010 CSE 265: System and Network Administration ©2004-2010 Brian D. Davison
Linux log files
● Most log files are recorded in /var/log
– /var/adm may also contain some (distro dependent)
● Most programs send entries to syslog daemon
– /etc/syslog.conf usually puts them in /var/log
● Sample log files:
– messages – main system log file
– maillog – record of sendmail activity
– boot.log – output of system startup scripts

Spring 2010 CSE 265: System and Network Administration ©2004-2010 Brian D. Davison
Other log files
– /var/log/wtmp
● Record of users' logins and logouts
● Binary format – use last to read
● Still truncated and rotated
– /var/log/lastlog
● Record of time of last log in
● Binary format (is used to say when you last logged in)
● Constant size – no need to rotate
– /var/log/dmesg
● Dump of kernel message buffer at end of boot

Spring 2010 CSE 265: System and Network Administration ©2004-2010 Brian D. Davison
Logrotate
● Excellent utility to manage log files
● Specifies groups of log files to be managed
# Example log rotation
rotate 5
weekly

/var/log/messages {
postrotate
/bin/kill -HUP `cat /var/run/syslogd.pid`
endscript
}
/var/log/samba/*.log {
notifempty
copytruncate
postrotate
/bin/kill -HUP `cat /var/lock/samba/*.pid`
endscript
}
Spring 2010 CSE 265: System and Network Administration ©2004-2010 Brian D. Davison
Syslog
● Comprehensive logging system
– Frees programmers from needing to write their own
– Allows sysadmins to control logging
● Flexible
– Can sort by source or severity level
– Output to variety of destinations – files, terminals,
other machines
● Can centralize logging to a well-controlled
machine

Spring 2010 CSE 265: System and Network Administration ©2004-2010 Brian D. Davison
Syslog (continued)
● Three parts
– syslogd – logging daemon (uses /etc/syslog.conf)
– openlog – library routines
– logger – shell command to submit log entries
● Apps use library to write to /dev/log
– UNIX domain socket
● Syslogd reads messages from /dev/log
– Outputs message depending on /etc/syslog.conf

Spring 2010 CSE 265: System and Network Administration ©2004-2010 Brian D. Davison
Sample syslog.conf
# Emergencies: tell everyone who is logged in
*.emerg;user.none *

*.warning;daemon,auth.info,user.none /var/log/messages
# Forward important messages to the central logger
*.warning;daemon,auth.info @netloghost

# printer errors
lpr.debug /var/log/lpd-errs

Spring 2010 CSE 265: System and Network Administration ©2004-2010 Brian D. Davison
Sample syslog output
Feb 22 04:04:21 wume1 named[2826]: lame server
resolving '211.68.246.64.in-addr.arpa' (in
'68.246.64.in-addr.arpa'?): 160.79.6.130#53
Feb 22 13:22:41 wume1 sshd(pam_unix)[16776]: session
opened for user brian by (uid=0)
Feb 22 13:22:44 wume1 su(pam_unix)[16802]: session
opened for user root by brian (uid=501)
Feb 25 20:31:57 wume1 sshd(pam_unix)[28375]: check
pass; user unknown
Feb 25 20:32:00 wume1 sshd(pam_unix)[28375]: 1 more
authentication failure; logname= uid=0 euid=0
tty=NODEVssh ruser= rhost=dyn032098.cc.lehigh.edu

Spring 2010 CSE 265: System and Network Administration ©2004-2010 Brian D. Davison
Condensing log files
● Syslog (as well as any other monitoring and
logging facility) generates lots of log files
● Need utilities to scan log files and find
important entries
– security-related entries
– messages about disks full
– messages repeated many times

Spring 2010 CSE 265: System and Network Administration ©2004-2010 Brian D. Davison
Summary
● It is imperative to monitor systems and
generate logs
– For warnings, job performance, trends, etc.
● Logs cannot be permitted to impact proper
system operation

Spring 2010 CSE 265: System and Network Administration ©2004-2010 Brian D. Davison

You might also like