News
Log files are the most valuable tools available for Linux system security. The logrotate program is used to provide the administrator with an up-to-date record of events taking place on the system.
The examples described in this post work on Ubuntu and related Linux systems. Other systems might use different log file and configuration file names, but the process itself should be very similar.
If you really want to see what's happening beneath the hood of your Linux distribution, you need to use log files.
Log rotation on Linux systems is more complicated than you might expect. Which log files are rotated, when and how often, whether or not the rotated log files are compressed, and how many ...
Featured text from the download: HOW DO YOU VIEW THOSE LOG FILES? There are two main methods of viewing Linux log files from the command line. The first is static and the second is in real-time.
Core concept: OSTree stores full system snapshots in a content-addressed manner, like Git for binary trees. Updates are ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results