Table of Contents
1. syslog log file
2. auth.log log file
3. Kernel log file
4. Practical operation example
Home Operation and Maintenance Linux Operation and Maintenance Study the contents of each field in Linux log files

Study the contents of each field in Linux log files

Feb 27, 2024 am 08:15 AM
linux log content

Study the contents of each field in Linux log files

Linux, as a widely used operating system, has a powerful log system to record important information during system operation. Log files are usually stored in the /var/log directory, which contains various types of log files, such as system logs, security logs, etc. This article will take an in-depth look at the contents of each column in a Linux log file and explain the meaning of each column with specific code examples.

1. syslog log file

Syslog is one of the most common log systems in Linux, recording various operating information of the system. Syslog log files are usually stored in the /var/log directory, and the most common one is the syslog file. The following is an example content of a syslog log file:

Mar 10 08:30:45 localhost cron[1234]: (root) CMD (run-parts /etc/cron.daily)
Mar 10 10:15:20 localhost sshd[5678]: Failed password for user1 from 192.168.1.100 port 22
Mar 11 14:55:30 localhost kernel: Out of memory: Kill process 4321 (apache2) score 500 or sacrifice child
Copy after login

In the above example, each line of log content usually contains the following columns:

  • Date and time: The log event was recorded The specific time of occurrence, in the format of month, day, hour:minute:second.
  • Host name: Identifies the host name where the log event is located, usually localhost.
  • Application name: Indicates the name of the application that generates logs, such as cron, sshd, kernel, etc.
  • Process ID: Record the process ID corresponding to the application that generated the log.
  • Log content: Specific log information, such as failed login attempts, insufficient memory, etc.

2. auth.log log file

The auth.log log file records the system’s authentication and authorization information and can be used to track user logins and permission changes. The following is an example content of an auth.log log file:

Mar 10 08:30:45 localhost sshd[1234]: Accepted publickey for user2 from 192.168.1.101 port 22
Mar 10 10:15:20 localhost sudo: user1 : TTY=pts/0 ; PWD=/home/user1 ; USER=root ; COMMAND=/bin/bash
Mar 11 14:55:30 localhost su: pam_unix(su:session): session opened for user2 by user1(uid=0)
Copy after login

In the auth.log log file, each line of log content usually contains the following columns:

  • Date and time : Record the specific time when the log event occurred.
  • Host name: Identifies the host name where the log event is located.
  • Application name: Indicates the name of the application that generates logs, such as sshd, sudo, su, etc.
  • Process ID: Record the process ID corresponding to the application that generated the log.
  • Log content: Specific authentication and authorization information, such as public key login, using sudo to switch users, etc.

3. Kernel log file

Kernel log file records the running information of the Linux kernel and can be used to diagnose system hardware and software problems. Generally speaking, the path of the Kernel log file is /var/log/kern.log. The following is an example content of a Kernel log file:

Mar 10 08:30:45 localhost kernel: [ 123.456789] eth0: link up (1000Mbps/Full duplex)
Mar 10 10:15:20 localhost kernel: [ 234.567890] CPU0: Core temperature above threshold, cpu clock throttled (total events = 1)
Mar 11 14:55:30 localhost kernel: [ 345.678901] Out of memory: Kill process 4321 (apache2) score 500 or sacrifice child
Copy after login

In the Kernel log file, each line of log content usually contains the following columns:

  • Date and time: The log was recorded The specific time the incident occurred.
  • Host name: Identifies the host name where the log event is located.
  • Kernel messages: specific information recorded by the kernel, such as network card status, temperature alarm, insufficient memory, etc.

4. Practical operation example

The following is a sample code for filtering specific logs in auth.log through the grep command:

grep "Accepted publickey" /var/log/auth.log
Copy after login

The above example will output auth The .log contains the log content of "Accepted publickey", which is convenient for users to view specific public key login information.

Through the introduction and sample code of this article, readers can have a deeper understanding of the meaning of each column in the Linux log file, and how to process and filter the log file through the command line tool. System administrators can use this information to monitor the operating status of the system, discover and solve problems in a timely manner, and ensure the stability and security of the system.

The above is the detailed content of Study the contents of each field in Linux log files. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
1 months ago By 尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Chat Commands and How to Use Them
1 months ago By 尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Difference between centos and ubuntu Difference between centos and ubuntu Apr 14, 2025 pm 09:09 PM

The key differences between CentOS and Ubuntu are: origin (CentOS originates from Red Hat, for enterprises; Ubuntu originates from Debian, for individuals), package management (CentOS uses yum, focusing on stability; Ubuntu uses apt, for high update frequency), support cycle (CentOS provides 10 years of support, Ubuntu provides 5 years of LTS support), community support (CentOS focuses on stability, Ubuntu provides a wide range of tutorials and documents), uses (CentOS is biased towards servers, Ubuntu is suitable for servers and desktops), other differences include installation simplicity (CentOS is thin)

How to install centos How to install centos Apr 14, 2025 pm 09:03 PM

CentOS installation steps: Download the ISO image and burn bootable media; boot and select the installation source; select the language and keyboard layout; configure the network; partition the hard disk; set the system clock; create the root user; select the software package; start the installation; restart and boot from the hard disk after the installation is completed.

Centos stops maintenance 2024 Centos stops maintenance 2024 Apr 14, 2025 pm 08:39 PM

CentOS will be shut down in 2024 because its upstream distribution, RHEL 8, has been shut down. This shutdown will affect the CentOS 8 system, preventing it from continuing to receive updates. Users should plan for migration, and recommended options include CentOS Stream, AlmaLinux, and Rocky Linux to keep the system safe and stable.

What are the backup methods for GitLab on CentOS What are the backup methods for GitLab on CentOS Apr 14, 2025 pm 05:33 PM

Backup and Recovery Policy of GitLab under CentOS System In order to ensure data security and recoverability, GitLab on CentOS provides a variety of backup methods. This article will introduce several common backup methods, configuration parameters and recovery processes in detail to help you establish a complete GitLab backup and recovery strategy. 1. Manual backup Use the gitlab-rakegitlab:backup:create command to execute manual backup. This command backs up key information such as GitLab repository, database, users, user groups, keys, and permissions. The default backup file is stored in the /var/opt/gitlab/backups directory. You can modify /etc/gitlab

Detailed explanation of docker principle Detailed explanation of docker principle Apr 14, 2025 pm 11:57 PM

Docker uses Linux kernel features to provide an efficient and isolated application running environment. Its working principle is as follows: 1. The mirror is used as a read-only template, which contains everything you need to run the application; 2. The Union File System (UnionFS) stacks multiple file systems, only storing the differences, saving space and speeding up; 3. The daemon manages the mirrors and containers, and the client uses them for interaction; 4. Namespaces and cgroups implement container isolation and resource limitations; 5. Multiple network modes support container interconnection. Only by understanding these core concepts can you better utilize Docker.

How to use docker desktop How to use docker desktop Apr 15, 2025 am 11:45 AM

How to use Docker Desktop? Docker Desktop is a tool for running Docker containers on local machines. The steps to use include: 1. Install Docker Desktop; 2. Start Docker Desktop; 3. Create Docker image (using Dockerfile); 4. Build Docker image (using docker build); 5. Run Docker container (using docker run).

What to do after centos stops maintenance What to do after centos stops maintenance Apr 14, 2025 pm 08:48 PM

After CentOS is stopped, users can take the following measures to deal with it: Select a compatible distribution: such as AlmaLinux, Rocky Linux, and CentOS Stream. Migrate to commercial distributions: such as Red Hat Enterprise Linux, Oracle Linux. Upgrade to CentOS 9 Stream: Rolling distribution, providing the latest technology. Select other Linux distributions: such as Ubuntu, Debian. Evaluate other options such as containers, virtual machines, or cloud platforms.

How to mount hard disk in centos How to mount hard disk in centos Apr 14, 2025 pm 08:15 PM

CentOS hard disk mount is divided into the following steps: determine the hard disk device name (/dev/sdX); create a mount point (it is recommended to use /mnt/newdisk); execute the mount command (mount /dev/sdX1 /mnt/newdisk); edit the /etc/fstab file to add a permanent mount configuration; use the umount command to uninstall the device to ensure that no process uses the device.

See all articles