![Lead Image © MuharremZengin, 123RF.com Lead Image © MuharremZengin, 123RF.com](/var/ezflow_site/storage/images/archive/2015/25/lean-on-logwatch/po-24983-123rf-muharremzengin_123rf-rot_leuchtende_br_cke_und_wasser_resized.png/108748-1-eng-US/PO-24983-123RF-MuharremZengin_123RF-Rot_leuchtende_Br_cke_und_Wasser_resized.png_medium.png)
Lead Image © MuharremZengin, 123RF.com
Lean on Logwatch
Critical Support
Even the best sys admins can feel overwhelmed with the logfiles generated by a single production server. The problem is especially severe if you are running multiple applications on one machine. Meet logwatch, a "customizable log analysis system [that] parses through your system's logs and creates a report analyzing areas that you specify" [1]. In this article, I look at this very popular tool, which I suspect many of you already use, and explore some of the lesser known options.
Lifesaver
A server that writes to many logs presents a couple of conspicuous challenges. The first challenge is physical limitation: Do you have enough spare space on your /var/log
disk partition? If a server performs several roles, you might have firewall logs, user login logs, and HTTP logs – all in addition to the multitude of mandatory system logs. Before you know it, you might have dozens of applications vying for access to your overburdened /var/log
directory.
The second issue is how to navigate the seemingly infinite screeds of recorded data successfully. It's an understatement to say the potentially critical information is surrounded by 10 times its volume of relatively useless noise. Faced with such a volume of data, it is imperative that you be able to zero in on the information you really need.
Timing is especially important when you are presented with a business-critical server issue, such as an attack. You need to know in advance the variety of logging formats employed by different packages, certain idiosyncrasies attributed to quirky applications, and whether you need to enable extra detail with debugging mode. All of these facets are essential if you want to pinpoint that elusive empirical evidence required to identify how an attacker has gained access to one or more of your servers. Empowered with
...Buy this article as PDF
(incl. VAT)