Whatever else you do to secure a Linux system, it must have comprehensive, accurate and carefully watched logs. Logs serve several purposes. First, they help us troubleshoot virtually all kinds of ...
In a column about syslog [see “syslog Configuration” in the December 2001 issue of LJ] I mentioned “stealth logging”--by running your central log server without an IP address, you can hide your ...
I'd like to centralize the logs produced by syslogd on CentOS 4 by combining netcat and ssh to move the data from udp to tcp transport then across an encrypted tunnel.<BR><BR>The problem I'm having is ...
Writing some messages to multiple locations is a pretty normal thing in all UNIX / Linux syslog configurations, so I would just leave it alone. You're not going to gain much of anything for all the ...