1. Trang chủ
  2. » Công Nghệ Thông Tin

solaris 8 system admin ii sa 288 phần 2 pdf

57 305 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 57
Dung lượng 831,1 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Upon completion of this module, you should be able to: ● Configure syslogmessage routing ● Modify log message priority and severity ● Determine the effect of theLOGHOSTvariable on the sy

Trang 1

Upon completion of this module, you should be able to:

● Configure syslogmessage routing

● Modify log message priority and severity

● Determine the effect of theLOGHOSTvariable on the syslog

process

● Describe the two methods of starting the syslogddaemon

● Add entries to a system log using the loggerutility

Additional Resources

Additional resources – The following references provide additional

details on the topics discussed in this module:

System Administration Guide, Volume 2, Part Number 805-7229-10

System Administration Guide, Volume 3, Part Number 806-0916-10

Trang 2

The syslog Facility

Thesyslog()function sends messages generated by thekernelandsystem utilities to thesyslogddaemon Depending on the

configuration of the/etc/syslog.conffile, this daemon can:

● Write messages to a system log

● Write messages to the system console

● Forward messages to a list of users

● Forward messages to thesyslogdon other hosts over the network

The most valuable feature ofsyslogis that it puts you in control ofmessage logging This enables you to decide which messages are to bekept and where the messages are to be placed

Trang 3

The syslog Concept

Destinations Programs/

generates messages

Processes messages

Trang 4

Controlling the Behavior of syslogd

Many processes are programmed to generate messages at variouslevels of importance in response to actions taken, or conditionsencountered, during operation

You can control the manner in whichsyslogdmanages thesemessages by modifying the/etc/syslog.confconfiguration file.From this configuration file, you can instructsyslogdto sortmessages by their source or their importance and route them to aspecified destination

Trang 5

Configuring the /etc/syslog.conf File

A configuration entry in the /etc/syslog.conffile consists of two

tab-separated fields: selector and action.

The selector field consists of a facility and a level written as

facility.level Facilities represent categories of system processesthat can generate messages Levels represent the severity or

importance of the message

The action field determines where to send the message

For example, placing the following entry in the /etc/syslog.conf

file causes error messages for all facilities to be sent to the

*.err Is the selector field;* is the facility, is the

delimiter, anderr is the level of the message

/var/adm/messages Is the action field

Trang 6

Facility is a system facility that is defined by the items shown in

Table 3-1

Note – You can use the*to select all facilities (for example*.err);however, you cannot use it to select all levels for a facility (forexample,kern.*)

Table 3-1 Facility

kern Messages generated by the kernel

user Messages generated by user processes This is the

default priority for messages from programs or ties not listed in this file

facili-mail The mail system

daemon System daemons, such asin.ftpd andtelnetd

auth The authorization system includinglogin,su, and

getty

syslog Messages generated internally bysyslogd

lpr The line printer spooling system –lpr andlpc

news Files reserved for the USENET network news system

uucp The UNIX-to-UNIX copy (UUCP) system; does not use

syslog

cron The cron and at facilities, includingcrontab,at, and

cron

local0-7 A field reserved for local use

mark Time-stamp messages produced internally by

syslogd

* All facilities, except themark facility

Trang 7

Level is the severity of the message Levels in order of descending

order of severity are shown in

The nonemessage is normally used only when debugging a program.The nonemessage appears when messages are not sent from theindicated facility to the selected file; for example, a selector of

*.debug;mail.nonesends all messages except mail messages to theselected file

Note – Not all levels of severity are implemented for all facilities in the

same way For more information, refer to the online manual pages

Table 3-2 Levels

emerg Panic conditions that are normally to be broadcast to all

users

alert Conditions that should be corrected immediately, such

as a corrupted system database

crit Warnings about critical conditions, such as hard device

errors

err Other errors

warning Warning messages

notice For conditions that are not error conditions, but might

require special handling

info Informational messages

debug Messages that are normally used only when debugging

a program

Trang 8

Action Field

The action field defines where the message should be forwarded Itcan have any one of the following forms:

● /filename

The absolute path for log file is required

Note – This file must be manually created if it does not exist.

● @host

You must prefix the host name or IP address with an@sign

Messages are forwarded to the syslogdof the remote system

● user1,user2user1and user2receive messages if they are logged in

● *

All logged-in users will receive messages

Trang 9

The /etc/syslog.conf File

A sample/etc/syslog.confconfiguration file is:

#ident "@(#)syslog.conf 1.5 98/12/14 SMI" /* SunOS 5.0 */

#

# Copyright (c) 1991-1998, by Sun Microsystems, Inc

# All rights reserved

#

# syslog configuration file

#

# This file is processed by m4 so be careful to quote (‘’) names

# that match m4 reserved words Also, within ifdef's, arguments

# containing commas must be quoted

# if a non-loghost machine chooses to have authentication messages

# sent to the loghost machine, un-comment out the following line:

#auth.notice ifdef(‘LOGHOST’, /var/log/authlog, @loghost)

mail.debug ifdef(‘LOGHOST’, /var/log/authlog, @loghost)

#

# non-loghost machines will use the following lines to cause "user"

# log messages to be logged locally

Trang 10

Starting and Stopping syslogd

The configuration file is read each timesyslogdstarts The

/etc/rc2.d/S74syslogfile starts syslogdduring each system boot

You can manually start or stopsyslogd, if the configuration file hasbeen modified, with the command:

# /etc/init.d/syslog start | stop

Trang 11

syslogd and the m4 Macro Processor

The syslogddaemon, them4macro processor, and the

/etc/syslog.conffile interact, in conceptual phases, to determinecorrect message routing These conceptual phases are described as:

1 syslogdrunsm4

2 m4processesifdefstatements in/etc/syslog.conf

3 syslogdusesm4output to route messages to the appropriateplaces

On first evaluation, it appears the syslogddaemon receives log routing information from the /etc/syslog.conffile However,

message-syslogddoes not read the/etc/syslog.conffile directly Instead,

syslogdstartsm4, which parses the/etc/syslog.conffile forifdef

statements that can be interpreted by m4

If m4does not recognize anym4commands on a line, it passes theoutput back tosyslogdas a two-column output thatsyslogdthenuses to route messages to appropriate destinations Ifm4encounters an

ifdefstatement within the /etc/syslog.conffile, theifdefisevaluated for a true or false condition, and message routing occursrelative to the output of the test

syslog.conf

m4

Action

Trang 13

Phase 1

Whensyslogdstarts on boot, syslogdevaluates the /etc/hostsfile

to check the IP address associated with thehostnamecompared to the

IP address associated with theloghost

In Example A,host1andloghostare both associated with IP address

192.9.200.1; therefore, syslogdruns the second command line,

/usr/ccs/bin/m4 -D LOGHOSTthat causes them4 LOGHOSTvariable

to be evaluated as TRUEduring the parsing of the /etc/sylog.conf

file

In Example B,host1is associated with IP address192.9.200.1, while

host2andloghostare both associated with IP address192.9.200.2;therefore, syslogdruns the first command line,

/usr/ccs/bin/m4(no -D LOGHOST) that causes the m4 LOGHOST

variable to be evaluated as FALSEduring the parsing of the

/etc/sylog.conffile

Trang 14

Phase 2

In the second phase, them4macro processor parses the

/etc/syslog.conffile For each uncommented line that is parsed,m4

searches the line for anifdefstatement If noifdefis encountered onthe line,m4passes the line back tosyslogddaemon

If them4finds a line with anifdefstatement, the line is evaluated fortheTRUEorFALSEcondition of theLOGHOSTvariable, andm4passes

syslogdthe output, accordingly For example,

mail.debug ifdef(‘LOGHOST’, /var/log/authlog, @loghost)

Consider, if theLOGHOSTvariable was evaluated as TRUEin Phase 1,then them4processor returns:

If theLOGHOSTvariable was evaluated asFALSEin Phase 1, then them4

processor returns:

In either case, the output has an entry in the selector field and an entry

in the action field

Phase 3

In phase 2, for each line that was parsed in the/etc/syslog.conf

file,m4produced output in a two-column field: A selector field and anaction field This information is returned tosyslogd, and syslogd

uses the information to route messages to their appropriatedestinations

Once configured,syslogdcontinues to run with this configuration

Trang 15

Modifying inetd to Use syslog

The inetdis the server process for many network services Theinetd

process listens for service requests on the TCP (or UDP) portsassociated with each of the service listed in its configuration file When

a request arrives, inetdexecutes the server program associated withthe service You can modify the inetdto log TCP connections usingthe syslogd

inetd Manual Page Excerpt

The following online manual page excerpt for inetdshows that onlythe daemonfacility and thenoticemessage level is supported:

% man inetd

Maintenance Commandsinetd(1M)

NAME inetd - Internet services daemon

-t Instructs inetd to trace the incomingconnections for all of its TCP services It does this bylogging the client’s IP address and TCP port number,along with the name of the service, using the syslog(3)facility UDP services can not be traced When tracing isenabled, inetd uses the syslog facility code ``daemon’’and ``notice’’ priority level

Note – The Internet daemon, inetd, provides services for manynetwork protocols including the telnetprotocol and File TransferProtocol (FTP)

Trang 16

The inetd Startup File

Using the-toption as an argument to the inetdcommand enablesTCP tracing You must enable the trace option for theinetddaemonforsyslogmessaging You add the-toption to the entry, which starts

inetdin the inetsvcscript in the/etc/init.ddirectory

The modified entry looks similar to the following:

# grep inetd /etc/init.d/inetsvc

Thenoticeentry in the/etc/syslog.conffile causes alldaemon

messages of levelnoticeto be sent to the /var/adm/messagesfile

Note – The/var/adm/messagesfile must exist and you must stopand start thesyslogdaemon

Trang 17

Example of syslog Logged Entry

You can monitor the syslogfile,/var/adm/messages, in real timeusing the command tail -f This holds the file open so you viewmessages being routed into this file by syslog

# tail -f /var/adm/messages

Figure 3-3 Example of syslogLogged Entry

The preceding output logs a telnetrequest to systemhost1from IPaddress 192.9.200.1on port 45800

To exit, press Control-C

Note – You can use scripts to automatically parse the log files and send

notification to support personnel should any unusual activity exist

Date/time Local

host

Processname

name/

PID#

Incomingrequest/

Trang 18

The logger Utility

With theloggercommand, you can add one-line entries to a systemlog file Typically, you can use theloggercommand as part of a script

Trang 19

The following example logs the System rebootedmessage to thedefault priority level noticeand the facilityuserfor syslogd

# logger System rebooted

TheSystem rebootedmessage should be logged to the file designated

for theuser.noticeselector field However, if you investigate further,you will find that theuser.noticeselector field is not configured (bydefault) in the /etc/syslog.conffile You can either add the

user.noticeselector field to the/etc/syslog.conffile, or you canprioritize the output as follows:

# logger -p user.err System rebooted

Changing the priority of the message to user.errwill route themessage to the /var/adm/messagesfile as indicated in the

/etc/syslog.conffile

Trang 20

Exercise: Using syslog and Auditing Utilities

Exercise objective – In this lab, you configure and use thesyslog

utility to better monitor your system

Preparation

Ensure that your system boots without errors and that you can log in

asroot

Task Summary

In this exercise, you accomplish the following:

● Configure sysloglogging for theloginand telnetdaemons

▼ Use thesyslogutility to write logs to the

/var/adm/messagesfile

▼ Configure syslogto log theauthand daemonfacilities

▼ Use thenoticeselector level

● Use thetailcommand to monitor the sysloglog in real time

● Use thetelnetcommand to test logging

Tasks

Trang 21

b Edit the file and add the selector field

auth.noticeto the second entry, which should look like thefollowing:

*.err;kern.debug;daemon.notice;mail.crit;auth.notice /var/adm/messages

c Save your changes, and quit the editor

d Edit the/etc/init.d/inetsvcfile and change the line forthe inetdcommand to include the-toption

/usr/sbin/inetd -s -t &

e Save your changes, and quit the editor

f Stop and start the syslogdprocess

2 Use thetailcommand in a terminal window to monitor the

sysloglog in real time

# tail -f /var/adm/messages

3 In another terminal window, test logging by using thetelnet

command to log in to your own system

# telnet your_hostname

Notice how thesyslogentry is updated as reported by thetail

command

Trang 22

4 Exit the session, and observe the entry.

# exit

Connection closed by foreign host

Note – Nothing is logged when you exit thetelnetsession

5 Press Control-C to stop the output of thetailcommand running

in the other window

Trang 23

Exercise Summary

Discussion – Take a few minutes to discuss the experiences, issues, or

discoveries that you had during the lab exercises

● Experiences

● Interpretations

● Conclusions

● Applications

Trang 24

Check Your Progress

Before continuing on to the next module, check that you are able toaccomplish the following:

❑ Configure syslogmessage routing

❑ Modify log message priority and severity

❑ Determine the effect of theLOGHOSTvariable on thesyslog

process

❑ Describe the two methods of starting thesyslogddaemon

❑ Add entries to a system log using theloggerutility

Trang 25

Upon completion of this module, you should be able to:

● List the three utilities used to create, check, and mount file systems

● Identify the physical path name differences between physical disksand virtual disks

● List the potential advantages of any virtual disk managementapplication

● List the basic difference between Solstice DiskSuite™ and SunStorEdge Volume Manager™

● List the main advantages of using a concatenated virtual filesystem

● List the main advantage of using a striped virtual file system

● Install the Solstice DiskSuite applications

● Use the Solstice DiskSuite application to dynamically grow a filesystem

Trang 26

Additional Resources

Additional resources – The following references provide additional

details on the topics discussed in this module:

System Administration Guide, Volume I, Part Number 805-7228

System Administration Guide, Volume II, Part Number 805-7229

Solstice DiskSuite 4.2.1 Reference Guide, Part Number 806-3204-10

Solstice DiskSuite 4.2 User’s Guide, Part Number 806-3205-10

Sun Enterprise Volume Manager 2.5 Administration Guide,

Part Number 805-1607

Trang 27

Physical Disks

In a standard Solaris 8 Operating Environment installation, resident drivers access all physical disks Each type of disk device has

memory-a unique driver

Typical Physical Disk Drivers

Typical physical disk drivers include:

● dad — IDE disk driver

● sd— The SCSI disk drive driver

For efficiency, most drivers are loaded into memory at system boottime

Access Paths

The access path to all physical disks is through path names defined inthe /devdirectory For every slice on every physical disk, there aretwo unique access paths—the block device path and the raw devicepath

Block Device Path

The block device path is used by commands, utilities, and processesthat refer to the slice as a file system For example, the following aretypical block device path names:

● /dev/dsk/c0t0d0s0

● /dev/dsk/c0t0d0s7

Trang 28

Raw Device Path

The raw device access path is used by utilities and processes that donot use the device as a file system but transfer data sector by sector.For example, the following are typical raw device path names:

Ngày đăng: 14/08/2014, 02:22

TỪ KHÓA LIÊN QUAN