An important part of any project, logging can be used as a debugging tool during development, and a troubleshooting tool once a system has been deployed in a production environment. Because most ...
We test five network configuration management products: AlterPoint’s DeviceAuthority Suite, Dorado Software’s RedCell, Rendition Networks’ TrueControl 3.0, Tripwire’s Tripwire for Network Devices (TND ...
In a column about syslog [see “syslog Configuration” in the December 2001 issue of LJ] I mentioned “stealth logging”--by running your central log server without an IP address, you can hide your ...
Writing some messages to multiple locations is a pretty normal thing in all UNIX / Linux syslog configurations, so I would just leave it alone. You're not going to gain much of anything for all the ...