svn commit: r44346 - head/en_US.ISO8859-1/books/handbook/config
Dru Lavigne
dru at FreeBSD.org
Mon Mar 24 21:22:34 UTC 2014
Author: dru
Date: Mon Mar 24 21:22:33 2014
New Revision: 44346
URL: http://svnweb.freebsd.org/changeset/doc/44346
Log:
White space fix only. Translators can ignore.
Sponsored by: iXsystems
Modified:
head/en_US.ISO8859-1/books/handbook/config/chapter.xml
Modified: head/en_US.ISO8859-1/books/handbook/config/chapter.xml
==============================================================================
--- head/en_US.ISO8859-1/books/handbook/config/chapter.xml Mon Mar 24 20:55:36 2014 (r44345)
+++ head/en_US.ISO8859-1/books/handbook/config/chapter.xml Mon Mar 24 21:22:33 2014 (r44346)
@@ -568,8 +568,8 @@ sshd is running as pid 433.</screen>
<para>A number of strategies may be applied in clustered
applications to separate site-wide configuration from
- system-specific configuration in order to reduce administration
- overhead. The recommended approach is to place
+ system-specific configuration in order to reduce
+ administration overhead. The recommended approach is to place
system-specific configuration into
<filename>/etc/rc.conf.local</filename>. For example, these
entries in <filename>/etc/rc.conf</filename> apply to all
@@ -587,9 +587,10 @@ defaultrouter="10.1.1.254"</programlisti
ifconfig_fxp0="inet 10.1.1.1/8"</programlisting>
<para>Distribute <filename>/etc/rc.conf</filename> to every
- system using an application such as <application>rsync</application> or
- <application>puppet</application>,
- while <filename>/etc/rc.conf.local</filename> remains
+ system using an application such as
+ <application>rsync</application> or
+ <application>puppet</application>, while
+ <filename>/etc/rc.conf.local</filename> remains
unique.</para>
<para>Upgrading the system will not overwrite
@@ -1202,7 +1203,7 @@ ifconfig_fxp0_alias7="inet 202.0.75.20 n
<sect1 xml:id="configtuning-syslog">
<info>
- <title>Configuring System Logging</title>
+ <title>Configuring System Logging</title>
<authorgroup>
<author>
@@ -1225,26 +1226,28 @@ ifconfig_fxp0_alias7="inet 202.0.75.20 n
<primary>&man.syslogd.8;</primary>
</indexterm>
- <para>Generating and reading system logs is an important aspect of system
- administration. The information in system logs can be used to detect hardware and software
- issues as well as application and system configuration errors. This information also plays an important role
- in security auditing and incident response. Most system daemons
- and applications will generate log entries.</para>
+ <para>Generating and reading system logs is an important aspect of
+ system administration. The information in system logs can be
+ used to detect hardware and software issues as well as
+ application and system configuration errors. This information
+ also plays an important role in security auditing and incident
+ response. Most system daemons and applications will generate
+ log entries.</para>
<para>&os; provides a system logger,
<application>syslogd</application>, to manage logging. By
- default, <application>syslogd</application> is
- started when the system boots. This is controlled by the variable
- <literal>syslogd_enable</literal> in
- <filename>/etc/rc.conf</filename>. There are numerous
- application arguments that can be set using
- <literal>syslogd_flags</literal> in
- <filename>/etc/rc.conf</filename>. Refer to &man.syslogd.8;
- for more information on the available arguments.</para>
-
- <para>This section describes how to configure the &os;
- system logger for both local and remote logging and how to perform log rotation
- and log management.</para>
+ default, <application>syslogd</application> is started when the
+ system boots. This is controlled by the variable
+ <literal>syslogd_enable</literal> in
+ <filename>/etc/rc.conf</filename>. There are numerous
+ application arguments that can be set using
+ <literal>syslogd_flags</literal> in
+ <filename>/etc/rc.conf</filename>. Refer to &man.syslogd.8; for
+ more information on the available arguments.</para>
+
+ <para>This section describes how to configure the &os; system
+ logger for both local and remote logging and how to perform log
+ rotation and log management.</para>
<sect2>
<title>Configuring Local Logging</title>
@@ -1253,29 +1256,29 @@ ifconfig_fxp0_alias7="inet 202.0.75.20 n
<para>The configuration file,
<filename>/etc/syslog.conf</filename>, controls what
- <application>syslogd</application> does with log entries as they are
- received. There are several parameters to control the
- handling of incoming events.
- The <firstterm>facility</firstterm> describes
- which subsystem generated the message, such as the kernel or a
- daemon, and the <firstterm>level</firstterm> describes the severity of the event that
- occurred. This makes it possible to configure if and where a log message is
- logged, depending on the facility
+ <application>syslogd</application> does with log entries as
+ they are received. There are several parameters to control
+ the handling of incoming events. The
+ <firstterm>facility</firstterm> describes which subsystem
+ generated the message, such as the kernel or a daemon, and the
+ <firstterm>level</firstterm> describes the severity of the
+ event that occurred. This makes it possible to configure if
+ and where a log message is logged, depending on the facility
and level. It is also possible to take action depending on
the application that sent the message, and in the case of
- remote logging, the hostname of the machine generating
- the logging event.</para>
+ remote logging, the hostname of the machine generating the
+ logging event.</para>
- <para>This configuration file contains one
- line per action, where the syntax for each line is a selector
- field followed by an action field. The syntax of the selector
- field is <replaceable>facility.level</replaceable> which will
- match log messages from <replaceable>facility</replaceable>
- at level <replaceable>level</replaceable> or higher. It is
- also possible to add an optional comparison flag before the
- level to specify more precisely what is logged. Multiple
- selector fields can be used for the same action, and are
- separated with a semicolon (<literal>;</literal>). Using
+ <para>This configuration file contains one line per action,
+ where the syntax for each line is a selector field followed by
+ an action field. The syntax of the selector field is
+ <replaceable>facility.level</replaceable> which will match log
+ messages from <replaceable>facility</replaceable> at level
+ <replaceable>level</replaceable> or higher. It is also
+ possible to add an optional comparison flag before the level
+ to specify more precisely what is logged. Multiple selector
+ fields can be used for the same action, and are separated with
+ a semicolon (<literal>;</literal>). Using
<literal>*</literal> will match everything. The action field
denotes where to send the log message, such as to a file or
remote log host. As an example, here is the default
@@ -1292,7 +1295,7 @@ ifconfig_fxp0_alias7="inet 202.0.75.20 n
*.notice;authpriv.none;kern.debug;lpr.info;mail.crit;news.err /var/log/messages
security.* /var/log/security
auth.info;authpriv.info /var/log/auth.log
-mail.info /var/log/maillog
+mail.info /var/log/maillog
lpr.info /var/log/lpd-errs
ftp.info /var/log/xferlog
cron.* /var/log/cron
@@ -1312,15 +1315,15 @@ cron.*
# news.notice /var/log/news/news.notice
# Uncomment this if you wish to see messages produced by devd
# !devd
-# *.>=info
+# *.>=info
!ppp
*.* /var/log/ppp.log
!*</programlisting>
<para>In this example:</para>
- <itemizedlist>
- <listitem>
+ <itemizedlist>
+ <listitem>
<para>Line 8 matches all messages with a level of
<literal>err</literal> or higher, as well as
<literal>kern.warning</literal>,
@@ -1328,38 +1331,37 @@ cron.*
<literal>mail.crit</literal>, and sends these log messages
to the console
(<filename>/dev/console</filename>).</para>
- </listitem>
+ </listitem>
<listitem>
- <para>Line 12 matches all messages from the <literal>mail</literal>
- facility at level <literal>info</literal> or above and
- logs the messages to
+ <para>Line 12 matches all messages from the
+ <literal>mail</literal> facility at level
+ <literal>info</literal> or above and logs the messages to
<filename>/var/log/maillog</filename>.</para>
- </listitem>
+ </listitem>
<listitem>
<para>Line 17 uses a comparison flag (<literal>=</literal>)
to only match messages at level <literal>debug</literal>
and logs them to
<filename>/var/log/debug.log</filename>.</para>
- </listitem>
+ </listitem>
<listitem>
<para>Line 33 is an example usage of a program
- specification. This makes the rules
- following it only valid for the specified program.
- In this case, only the
+ specification. This makes the rules following it only
+ valid for the specified program. In this case, only the
messages generated by <application>ppp</application> are
- logged to
- <filename>/var/log/ppp.log</filename>.</para>
- </listitem>
- </itemizedlist>
+ logged to <filename>/var/log/ppp.log</filename>.</para>
+ </listitem>
+ </itemizedlist>
<para>The available levels, in order from most to least
- critical are <literal>emerg</literal>, <literal>alert</literal>,
- <literal>crit</literal>, <literal>err</literal>,
- <literal>warning</literal>, <literal>notice</literal>,
- <literal>info</literal>, and <literal>debug</literal>.</para>
+ critical are <literal>emerg</literal>,
+ <literal>alert</literal>, <literal>crit</literal>,
+ <literal>err</literal>, <literal>warning</literal>,
+ <literal>notice</literal>, <literal>info</literal>, and
+ <literal>debug</literal>.</para>
<para>The facilities, in no particular order, are
<literal>auth</literal>, <literal>authpriv</literal>,
@@ -1373,10 +1375,9 @@ cron.*
<literal>local7</literal>. Be aware that other operating
systems might have different facilities.</para>
- <para>To log everything
- of level <literal>notice</literal> and
- higher to <filename>/var/log/daemon.log</filename>, add
- the following entry:</para>
+ <para>To log everything of level <literal>notice</literal> and
+ higher to <filename>/var/log/daemon.log</filename>, add the
+ following entry:</para>
<programlisting>daemon.notice /var/log/daemon.log</programlisting>
@@ -1395,30 +1396,30 @@ cron.*
<indexterm><primary>log rotation</primary></indexterm>
<indexterm><primary>log management</primary></indexterm>
- <para>Log files can grow quickly, taking up disk space and
- making it more difficult to locate useful
- information. Log management
- attempts to mitigate this. In &os;, <application>newsyslog</application> is used
- to manage log files. This built-in program periodically rotates and
+ <para>Log files can grow quickly, taking up disk space and
+ making it more difficult to locate useful information. Log
+ management attempts to mitigate this. In &os;,
+ <application>newsyslog</application> is used to manage log
+ files. This built-in program periodically rotates and
compresses log files, and optionally creates missing log files
and signals programs when log files are moved. The log files
- may be generated by <application>syslogd</application> or
- by any other program which generates log files.
- While <application>syslogd</application> is normally run from
+ may be generated by <application>syslogd</application> or by
+ any other program which generates log files. While
+ <application>syslogd</application> is normally run from
&man.cron.8;, it is not a system daemon. In the default
configuration, it runs every hour.</para>
- <para>To know which actions to take, <application>newsyslog</application> reads
- its configuration file,
- <filename>/etc/newsyslog.conf</filename>. This
- file contains one line for each log file that
- <application>newsyslog</application> manages. Each line states the file
- owner, permissions, when to rotate that file, optional flags
- that affect log rotation, such as compression, and programs
- to signal when the log is rotated. Here is the default
- configuration in &os;:</para>
+ <para>To know which actions to take,
+ <application>newsyslog</application> reads its configuration
+ file, <filename>/etc/newsyslog.conf</filename>. This file
+ contains one line for each log file that
+ <application>newsyslog</application> manages. Each line
+ states the file owner, permissions, when to rotate that file,
+ optional flags that affect log rotation, such as compression,
+ and programs to signal when the log is rotated. Here is the
+ default configuration in &os;:</para>
- <programlisting># configuration file for newsyslog
+ <programlisting># configuration file for newsyslog
# $FreeBSD$
#
# Entries which do not specify the '/pid_file' field will cause the
@@ -1458,36 +1459,33 @@ cron.*
/var/log/weekly.log 640 5 1 $W6D0 JN
/var/log/xferlog 600 7 100 * JC</programlisting>
- <para>Each line starts with the name of the log to be
- rotated, optionally followed by an owner and group for both
- rotated and newly created files. The
- <literal>mode</literal> field sets the permissions on the
- log file and <literal>count</literal> denotes how many
- rotated log files should be kept. The
- <literal>size</literal> and <literal>when</literal> fields
- tell <application>newsyslog</application> when to rotate the file. A log
- file is rotated when either its size is larger than the
- <literal>size</literal> field or when the time in the
- <literal>when</literal> filed has passed.
- An asterisk (<literal>*</literal>) means that this field is ignored. The
- <replaceable>flags</replaceable> field gives
- further instructions, such as how to
- compress the rotated file or to create the log file if it
- is missing. The last two fields are optional and
- specify the name of the Process ID
- (<acronym>PID</acronym>) file of a
- process and a signal number to send to that process when the
- file is rotated.</para>
-
- <para>For more information on all fields, valid
- flags, and how to specify the rotation time, refer to
- &man.newsyslog.conf.5;. Since <application>newsyslog</application> is run from
- &man.cron.8;, it can not rotate files more often than it is
- scheduled to run from &man.cron.8;.</para>
+ <para>Each line starts with the name of the log to be rotated,
+ optionally followed by an owner and group for both rotated and
+ newly created files. The <literal>mode</literal> field sets
+ the permissions on the log file and <literal>count</literal>
+ denotes how many rotated log files should be kept. The
+ <literal>size</literal> and <literal>when</literal> fields
+ tell <application>newsyslog</application> when to rotate the
+ file. A log file is rotated when either its size is larger
+ than the <literal>size</literal> field or when the time in the
+ <literal>when</literal> filed has passed. An asterisk
+ (<literal>*</literal>) means that this field is ignored. The
+ <replaceable>flags</replaceable> field gives further
+ instructions, such as how to compress the rotated file or to
+ create the log file if it is missing. The last two fields are
+ optional and specify the name of the Process ID
+ (<acronym>PID</acronym>) file of a process and a signal number
+ to send to that process when the file is rotated.</para>
+
+ <para>For more information on all fields, valid flags, and how
+ to specify the rotation time, refer to &man.newsyslog.conf.5;.
+ Since <application>newsyslog</application> is run from
+ &man.cron.8;, it can not rotate files more often than it is
+ scheduled to run from &man.cron.8;.</para>
</sect2>
- <sect2 xml:id="network-syslogd">
- <info>
+ <sect2 xml:id="network-syslogd">
+ <info>
<title>Configuring Remote Logging</title>
<authorgroup>
@@ -1501,182 +1499,188 @@ cron.*
</authorgroup>
</info>
- <para>Monitoring the log files of
- multiple hosts can become unwieldy as the number of systems
- increases. Configuring centralized logging can reduce some of
- the administrative burden of log file administration.</para>
-
- <para>In &os;, centralized log file aggregation, merging, and rotation can
- be configured using <application>syslogd</application>
- and<application>newsyslog</application>. This section demonstrates an example
- configuration, where host <systemitem>A</systemitem>, named
- <systemitem
- class="fqdomainname">logserv.example.com</systemitem>, will
- collect logging information for the local network. Host
+ <para>Monitoring the log files of multiple hosts can become
+ unwieldy as the number of systems increases. Configuring
+ centralized logging can reduce some of the administrative
+ burden of log file administration.</para>
+
+ <para>In &os;, centralized log file aggregation, merging, and
+ rotation can be configured using
+ <application>syslogd</application> and
+ <application>newsyslog</application>. This section
+ demonstrates an example configuration, where host
+ <systemitem>A</systemitem>, named <systemitem
+ class="fqdomainname">logserv.example.com</systemitem>, will
+ collect logging information for the local network. Host
<systemitem>B</systemitem>, named <systemitem
class="fqdomainname">logclient.example.com</systemitem>, will
be configured to pass logging information to the logging
server.</para>
- <sect3>
- <title>Log Server Configuration</title>
+ <sect3>
+ <title>Log Server Configuration</title>
- <para>A log server is a system that has been configured to
- accept logging information from other hosts. Before
- configuring a log server, check the following:</para>
+ <para>A log server is a system that has been configured to
+ accept logging information from other hosts. Before
+ configuring a log server, check the following:</para>
- <itemizedlist>
- <listitem>
- <para>If there is a firewall between the logging server and
- any logging clients, ensure that the firewall ruleset
- allows <acronym>UDP</acronym> port 514 for both the
- clients and the server.</para>
- </listitem>
+ <itemizedlist>
+ <listitem>
+ <para>If there is a firewall between the logging server
+ and any logging clients, ensure that the firewall
+ ruleset allows <acronym>UDP</acronym> port 514 for both
+ the clients and the server.</para>
+ </listitem>
- <listitem>
- <para>The logging server and all client machines must have
- forward and reverse entries in the local
- <acronym>DNS</acronym>. If the network does not have a
- <acronym>DNS</acronym> server, create entries in each
- system's <filename>/etc/hosts</filename>. Proper name
- resolution is required so that log entries are not
- rejected by the logging server.</para>
- </listitem>
- </itemizedlist>
+ <listitem>
+ <para>The logging server and all client machines must
+ have forward and reverse entries in the local
+ <acronym>DNS</acronym>. If the network does not have a
+ <acronym>DNS</acronym> server, create entries in each
+ system's <filename>/etc/hosts</filename>. Proper name
+ resolution is required so that log entries are not
+ rejected by the logging server.</para>
+ </listitem>
+ </itemizedlist>
- <para>On the log server, edit
- <filename>/etc/syslog.conf</filename> to specify the name of
- the client to receive log entries from, the logging facility
- to be used, and the name of the log to store the host's log
- entries. This example adds the hostname of
- <systemitem>B</systemitem>, logs all facilities, and stores
- the log entries in
- <filename>/var/log/logclient.log</filename>.</para>
+ <para>On the log server, edit
+ <filename>/etc/syslog.conf</filename> to specify the name of
+ the client to receive log entries from, the logging facility
+ to be used, and the name of the log to store the host's log
+ entries. This example adds the hostname of
+ <systemitem>B</systemitem>, logs all facilities, and stores
+ the log entries in
+ <filename>/var/log/logclient.log</filename>.</para>
- <example>
- <title>Sample Log Server Configuration</title>
+ <example>
+ <title>Sample Log Server Configuration</title>
- <programlisting>+logclient.example.com
+ <programlisting>+logclient.example.com
*.* /var/log/logclient.log</programlisting>
- </example>
+ </example>
- <para>When adding multiple log clients, add a similar two-line
- entry for each client. More information about the available
- facilities may be found in &man.syslog.conf.5;.</para>
+ <para>When adding multiple log clients, add a similar two-line
+ entry for each client. More information about the available
+ facilities may be found in &man.syslog.conf.5;.</para>
- <para>Next, configure <filename>/etc/rc.conf</filename>:</para>
+ <para>Next, configure
+ <filename>/etc/rc.conf</filename>:</para>
- <programlisting>syslogd_enable="YES"
+ <programlisting>syslogd_enable="YES"
syslogd_flags="-a logclient.example.com -v -v"</programlisting>
- <para>The first entry starts <application>syslogd</application>
- at system boot. The second entry allows log entries from the
- specified client. The <option>-v -v</option> increases the
- verbosity of logged messages. This is useful for tweaking
- facilities as administrators are able to see what type of
- messages are being logged under each facility.</para>
-
- <para>Multiple <option>-a</option> options may be specified to
- allow logging from multiple clients. <acronym>IP</acronym>
- addresses and whole netblocks may also be specified. Refer to
- &man.syslogd.8; for a full list of possible options.</para>
+ <para>The first entry starts
+ <application>syslogd</application> at system boot. The
+ second entry allows log entries from the specified client.
+ The <option>-v -v</option> increases the verbosity of logged
+ messages. This is useful for tweaking facilities as
+ administrators are able to see what type of messages are
+ being logged under each facility.</para>
+
+ <para>Multiple <option>-a</option> options may be specified to
+ allow logging from multiple clients. <acronym>IP</acronym>
+ addresses and whole netblocks may also be specified. Refer
+ to &man.syslogd.8; for a full list of possible
+ options.</para>
- <para>Finally, create the log file:</para>
+ <para>Finally, create the log file:</para>
- <screen>&prompt.root; <userinput>touch /var/log/logclient.log</userinput></screen>
+ <screen>&prompt.root; <userinput>touch /var/log/logclient.log</userinput></screen>
- <para>At this point, <application>syslogd</application> should
- be restarted and verified:</para>
+ <para>At this point, <application>syslogd</application> should
+ be restarted and verified:</para>
- <screen>&prompt.root; <userinput>service syslogd restart</userinput>
+ <screen>&prompt.root; <userinput>service syslogd restart</userinput>
&prompt.root; <userinput>pgrep syslog</userinput></screen>
- <para>If a <acronym>PID</acronym> is returned, the server
- restarted successfully, and client configuration can begin.
- If the server did not restart, consult
- <filename>/var/log/messages</filename> for the error.</para>
- </sect3>
-
- <sect3>
- <title>Log Client Configuration</title>
-
- <para>A logging client sends log entries to a logging server on
- the network. The client also keeps a local copy of its own
- logs.</para>
-
- <para>Once a logging server has been configured, edit
- <filename>/etc/rc.conf</filename> on the logging
- client:</para>
+ <para>If a <acronym>PID</acronym> is returned, the server
+ restarted successfully, and client configuration can begin.
+ If the server did not restart, consult
+ <filename>/var/log/messages</filename> for the error.</para>
+ </sect3>
+
+ <sect3>
+ <title>Log Client Configuration</title>
+
+ <para>A logging client sends log entries to a logging server
+ on the network. The client also keeps a local copy of its
+ own logs.</para>
+
+ <para>Once a logging server has been configured, edit
+ <filename>/etc/rc.conf</filename> on the logging
+ client:</para>
- <programlisting>syslogd_enable="YES"
+ <programlisting>syslogd_enable="YES"
syslogd_flags="-s -v -v"</programlisting>
- <para>The first entry enables <application>syslogd</application>
- on boot up. The second entry prevents logs from being
- accepted by this client from other hosts (<option>-s</option>)
- and increases the verbosity of logged messages.</para>
-
- <para>Next, define the logging server in the client's
- <filename>/etc/syslog.conf</filename>. In this example, all
- logged facilities are sent to a remote system, denoted by the
- <literal>@</literal> symbol, with the specified
- hostname:</para>
-
- <programlisting>*.* @logserv.example.com</programlisting>
-
- <para>After saving the edit, restart
- <application>syslogd</application> for the changes to take
- effect:</para>
-
- <screen>&prompt.root; <userinput>service syslogd restart</userinput></screen>
-
- <para>To test that log messages are being sent across the
- network, use &man.logger.1; on the client to send a message to
- <application>syslogd</application>:</para>
-
- <screen>&prompt.root; <userinput>logger "<replaceable>Test message from logclient</replaceable>"</userinput></screen>
-
- <para>This message should now exist both in
- <filename>/var/log/messages</filename> on the client and
- <filename>/var/log/logclient.log</filename> on the log
- server.</para>
- </sect3>
-
- <sect3>
- <title>Debugging Log Servers</title>
-
- <para>If no messages are being received on the log server, the
- cause is most likely a network connectivity issue, a hostname
- resolution issue, or a typo in a configuration file. To
- isolate the cause, ensure that both the logging server and the
- logging client are able to <command>ping</command> each other
- using the hostname specified in their
- <filename>/etc/rc.conf</filename>. If this fails, check the
- network cabling, the firewall ruleset, and the hostname
- entries in the <acronym>DNS</acronym> server or
- <filename>/etc/hosts</filename> on both the logging server and
- clients. Repeat until the <command>ping</command> is
- successful from both hosts.</para>
-
- <para>If the <command>ping</command> succeeds on both hosts but
- log messages are still not being received, temporarily
- increase logging verbosity to narrow down the configuration
- issue. In the following example,
- <filename>/var/log/logclient.log</filename> on the logging
- server is empty and <filename>/var/log/messages</filename> on
- the logging client does not indicate a reason for the failure.
- To increase debugging output, edit the
- <literal>syslogd_flags</literal> entry on the logging server
- and issue a restart:</para>
+ <para>The first entry enables
+ <application>syslogd</application> on boot up. The second
+ entry prevents logs from being accepted by this client from
+ other hosts (<option>-s</option>) and increases the
+ verbosity of logged messages.</para>
+
+ <para>Next, define the logging server in the client's
+ <filename>/etc/syslog.conf</filename>. In this example, all
+ logged facilities are sent to a remote system, denoted by
+ the <literal>@</literal> symbol, with the specified
+ hostname:</para>
+
+ <programlisting>*.* @logserv.example.com</programlisting>
+
+ <para>After saving the edit, restart
+ <application>syslogd</application> for the changes to take
+ effect:</para>
+
+ <screen>&prompt.root; <userinput>service syslogd restart</userinput></screen>
+
+ <para>To test that log messages are being sent across the
+ network, use &man.logger.1; on the client to send a message
+ to <application>syslogd</application>:</para>
+
+ <screen>&prompt.root; <userinput>logger "<replaceable>Test message from logclient</replaceable>"</userinput></screen>
+
+ <para>This message should now exist both in
+ <filename>/var/log/messages</filename> on the client and
+ <filename>/var/log/logclient.log</filename> on the log
+ server.</para>
+ </sect3>
+
+ <sect3>
+ <title>Debugging Log Servers</title>
- <programlisting>syslogd_flags="-d -a logclien.example.com -v -v"</programlisting>
+ <para>If no messages are being received on the log server, the
+ cause is most likely a network connectivity issue, a
+ hostname resolution issue, or a typo in a configuration
+ file. To isolate the cause, ensure that both the logging
+ server and the logging client are able to
+ <command>ping</command> each other using the hostname
+ specified in their <filename>/etc/rc.conf</filename>. If
+ this fails, check the network cabling, the firewall ruleset,
+ and the hostname entries in the <acronym>DNS</acronym>
+ server or <filename>/etc/hosts</filename> on both the
+ logging server and clients. Repeat until the
+ <command>ping</command> is successful from both
+ hosts.</para>
+
+ <para>If the <command>ping</command> succeeds on both hosts
+ but log messages are still not being received, temporarily
+ increase logging verbosity to narrow down the configuration
+ issue. In the following example,
+ <filename>/var/log/logclient.log</filename> on the logging
+ server is empty and <filename>/var/log/messages</filename>
+ on the logging client does not indicate a reason for the
+ failure. To increase debugging output, edit the
+ <literal>syslogd_flags</literal> entry on the logging server
+ and issue a restart:</para>
- <screen>&prompt.root; <userinput>service syslogd restart</userinput></screen>
+ <programlisting>syslogd_flags="-d -a logclien.example.com -v -v"</programlisting>
- <para>Debugging data similar to the following will flash on the
- console immediately after the restart:</para>
+ <screen>&prompt.root; <userinput>service syslogd restart</userinput></screen>
- <screen>logmsg: pri 56, flags 4, from logserv.example.com, msg syslogd: restart
+ <para>Debugging data similar to the following will flash on
+ the console immediately after the restart:</para>
+
+ <screen>logmsg: pri 56, flags 4, from logserv.example.com, msg syslogd: restart
syslogd: restarted
logmsg: pri 6, flags 4, from logserv.example.com, msg syslogd: kernel boot file is /boot/kernel/kernel
Logging to FILE /var/log/messages
@@ -1685,13 +1689,13 @@ cvthname(192.168.1.10)
validate: dgram from IP 192.168.1.10, port 514, name logclient.example.com;
rejected in rule 0 due to name mismatch.</screen>
- <para>In this example, the log messages are being rejected due
- to a typo which results in a hostname mismatch. The client's
- hostname should be <literal>logclient</literal>, not
- <literal>logclien</literal>. Fix the typo, issue a restart,
- and verify the results:</para>
+ <para>In this example, the log messages are being rejected due
+ to a typo which results in a hostname mismatch. The
+ client's hostname should be <literal>logclient</literal>,
+ not <literal>logclien</literal>. Fix the typo, issue a
+ restart, and verify the results:</para>
- <screen>&prompt.root; <userinput>service syslogd restart</userinput>
+ <screen>&prompt.root; <userinput>service syslogd restart</userinput>
logmsg: pri 56, flags 4, from logserv.example.com, msg syslogd: restart
syslogd: restarted
logmsg: pri 6, flags 4, from logserv.example.com, msg syslogd: kernel boot file is /boot/kernel/kernel
@@ -1705,31 +1709,33 @@ logmsg: pri 15, flags 0, from logclient.
Logging to FILE /var/log/logclient.log
Logging to FILE /var/log/messages</screen>
- <para>At this point, the messages are being properly received
- and placed in the correct file.</para>
- </sect3>
-
- <sect3>
- <title>Security Considerations</title>
-
- <para>As with any network service, security requirements should
- be considered before implementing a logging server. Log files
- may contain sensitive data about services enabled on the local
- host, user accounts, and configuration data. Network data
- sent from the client to the server will not be encrypted or
- password protected. If a need for encryption exists, consider
- using <package>security/stunnel</package>, which will transmit
- the logging data over an encrypted tunnel.</para>
-
- <para>Local security is also an issue. Log files are not
- encrypted during use or after log rotation. Local users may
- access log files to gain additional insight into system
- configuration. Setting proper permissions on log files is
- critical. The built-in log rotator, <application>newsyslog</application>,
- supports setting permissions on newly created and rotated log
- files. Setting log files to mode <literal>600</literal>
- should prevent unwanted access by local users. Refer to
- &man.newsyslog.conf.5; for additional information.</para>
+ <para>At this point, the messages are being properly received
+ and placed in the correct file.</para>
+ </sect3>
+
+ <sect3>
+ <title>Security Considerations</title>
+
+ <para>As with any network service, security requirements
+ should be considered before implementing a logging server.
+ Log files may contain sensitive data about services enabled
+ on the local host, user accounts, and configuration data.
+ Network data sent from the client to the server will not be
+ encrypted or password protected. If a need for encryption
+ exists, consider using <package>security/stunnel</package>,
+ which will transmit the logging data over an encrypted
+ tunnel.</para>
+
+ <para>Local security is also an issue. Log files are not
+ encrypted during use or after log rotation. Local users may
+ access log files to gain additional insight into system
+ configuration. Setting proper permissions on log files is
+ critical. The built-in log rotator,
+ <application>newsyslog</application>, supports setting
+ permissions on newly created and rotated log files. Setting
+ log files to mode <literal>600</literal> should prevent
+ unwanted access by local users. Refer to
+ &man.newsyslog.conf.5; for additional information.</para>
</sect3>
</sect2>
</sect1>
More information about the svn-doc-head
mailing list