O'Reilly logo

UNIX System Administration Handbook, Third Edition by Trent R. Hein, Evi Nemeth, Garth Snyder, Scott Seebass

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

11.1 LOGGING POLICIES

Logging policies vary from site to site. Common schemes include the following:

•   Throw away all data immediately.

•   Reset log files at periodic intervals.

•   Rotate log files, keeping data for a fixed time.

•   Compress and archive logs to tape or other permanent media.

The correct choice for your site depends on how much disk space you have and how security conscious you are. Even sites with an abundance of disk space must deal with the cancerous growth of log files.

Whatever scheme you select, maintenance of log files should be automated with cron. See Chapter 9, Periodic Processes, for more information about this daemon.

Throwing away log files

We do not recommend throwing away all logging information. Sites that ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required