Table of Contents
1. syslog log file
2. auth.log log file
3. Kernel log file
4. Practical operation example
Home Operation and Maintenance Linux Operation and Maintenance Study the contents of each field in Linux log files

Study the contents of each field in Linux log files

Feb 27, 2024 am 08:15 AM
linux log content

Study the contents of each field in Linux log files

Linux, as a widely used operating system, has a powerful log system to record important information during system operation. Log files are usually stored in the /var/log directory, which contains various types of log files, such as system logs, security logs, etc. This article will take an in-depth look at the contents of each column in a Linux log file and explain the meaning of each column with specific code examples.

1. syslog log file

Syslog is one of the most common log systems in Linux, recording various operating information of the system. Syslog log files are usually stored in the /var/log directory, and the most common one is the syslog file. The following is an example content of a syslog log file:

Mar 10 08:30:45 localhost cron[1234]: (root) CMD (run-parts /etc/cron.daily)
Mar 10 10:15:20 localhost sshd[5678]: Failed password for user1 from 192.168.1.100 port 22
Mar 11 14:55:30 localhost kernel: Out of memory: Kill process 4321 (apache2) score 500 or sacrifice child
Copy after login

In the above example, each line of log content usually contains the following columns:

  • Date and time: The log event was recorded The specific time of occurrence, in the format of month, day, hour:minute:second.
  • Host name: Identifies the host name where the log event is located, usually localhost.
  • Application name: Indicates the name of the application that generates logs, such as cron, sshd, kernel, etc.
  • Process ID: Record the process ID corresponding to the application that generated the log.
  • Log content: Specific log information, such as failed login attempts, insufficient memory, etc.

2. auth.log log file

The auth.log log file records the system’s authentication and authorization information and can be used to track user logins and permission changes. The following is an example content of an auth.log log file:

Mar 10 08:30:45 localhost sshd[1234]: Accepted publickey for user2 from 192.168.1.101 port 22
Mar 10 10:15:20 localhost sudo: user1 : TTY=pts/0 ; PWD=/home/user1 ; USER=root ; COMMAND=/bin/bash
Mar 11 14:55:30 localhost su: pam_unix(su:session): session opened for user2 by user1(uid=0)
Copy after login

In the auth.log log file, each line of log content usually contains the following columns:

  • Date and time : Record the specific time when the log event occurred.
  • Host name: Identifies the host name where the log event is located.
  • Application name: Indicates the name of the application that generates logs, such as sshd, sudo, su, etc.
  • Process ID: Record the process ID corresponding to the application that generated the log.
  • Log content: Specific authentication and authorization information, such as public key login, using sudo to switch users, etc.

3. Kernel log file

Kernel log file records the running information of the Linux kernel and can be used to diagnose system hardware and software problems. Generally speaking, the path of the Kernel log file is /var/log/kern.log. The following is an example content of a Kernel log file:

Mar 10 08:30:45 localhost kernel: [ 123.456789] eth0: link up (1000Mbps/Full duplex)
Mar 10 10:15:20 localhost kernel: [ 234.567890] CPU0: Core temperature above threshold, cpu clock throttled (total events = 1)
Mar 11 14:55:30 localhost kernel: [ 345.678901] Out of memory: Kill process 4321 (apache2) score 500 or sacrifice child
Copy after login

In the Kernel log file, each line of log content usually contains the following columns:

  • Date and time: The log was recorded The specific time the incident occurred.
  • Host name: Identifies the host name where the log event is located.
  • Kernel messages: specific information recorded by the kernel, such as network card status, temperature alarm, insufficient memory, etc.

4. Practical operation example

The following is a sample code for filtering specific logs in auth.log through the grep command:

grep "Accepted publickey" /var/log/auth.log
Copy after login

The above example will output auth The .log contains the log content of "Accepted publickey", which is convenient for users to view specific public key login information.

Through the introduction and sample code of this article, readers can have a deeper understanding of the meaning of each column in the Linux log file, and how to process and filter the log file through the command line tool. System administrators can use this information to monitor the operating status of the system, discover and solve problems in a timely manner, and ensure the stability and security of the system.

The above is the detailed content of Study the contents of each field in Linux log files. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Hot Topics

Java Tutorial
1662
14
PHP Tutorial
1262
29
C# Tutorial
1235
24
Linux Architecture: Unveiling the 5 Basic Components Linux Architecture: Unveiling the 5 Basic Components Apr 20, 2025 am 12:04 AM

The five basic components of the Linux system are: 1. Kernel, 2. System library, 3. System utilities, 4. Graphical user interface, 5. Applications. The kernel manages hardware resources, the system library provides precompiled functions, system utilities are used for system management, the GUI provides visual interaction, and applications use these components to implement functions.

How to check the warehouse address of git How to check the warehouse address of git Apr 17, 2025 pm 01:54 PM

To view the Git repository address, perform the following steps: 1. Open the command line and navigate to the repository directory; 2. Run the "git remote -v" command; 3. View the repository name in the output and its corresponding address.

vscode Previous Next Shortcut Key vscode Previous Next Shortcut Key Apr 15, 2025 pm 10:51 PM

VS Code One-step/Next step shortcut key usage: One-step (backward): Windows/Linux: Ctrl ←; macOS: Cmd ←Next step (forward): Windows/Linux: Ctrl →; macOS: Cmd →

What is the main purpose of Linux? What is the main purpose of Linux? Apr 16, 2025 am 12:19 AM

The main uses of Linux include: 1. Server operating system, 2. Embedded system, 3. Desktop operating system, 4. Development and testing environment. Linux excels in these areas, providing stability, security and efficient development tools.

How to run java code in notepad How to run java code in notepad Apr 16, 2025 pm 07:39 PM

Although Notepad cannot run Java code directly, it can be achieved by using other tools: using the command line compiler (javac) to generate a bytecode file (filename.class). Use the Java interpreter (java) to interpret bytecode, execute the code, and output the result.

How to run sublime after writing the code How to run sublime after writing the code Apr 16, 2025 am 08:51 AM

There are six ways to run code in Sublime: through hotkeys, menus, build systems, command lines, set default build systems, and custom build commands, and run individual files/projects by right-clicking on projects/files. The build system availability depends on the installation of Sublime Text.

laravel installation code laravel installation code Apr 18, 2025 pm 12:30 PM

To install Laravel, follow these steps in sequence: Install Composer (for macOS/Linux and Windows) Install Laravel Installer Create a new project Start Service Access Application (URL: http://127.0.0.1:8000) Set up the database connection (if required)

How to use VSCode How to use VSCode Apr 15, 2025 pm 11:21 PM

Visual Studio Code (VSCode) is a cross-platform, open source and free code editor developed by Microsoft. It is known for its lightweight, scalability and support for a wide range of programming languages. To install VSCode, please visit the official website to download and run the installer. When using VSCode, you can create new projects, edit code, debug code, navigate projects, expand VSCode, and manage settings. VSCode is available for Windows, macOS, and Linux, supports multiple programming languages ​​and provides various extensions through Marketplace. Its advantages include lightweight, scalability, extensive language support, rich features and version

See all articles