Preview

the notebook

Powerful Essays
Open Document
Open Document
7381 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
the notebook
9.1. Finding and Gathering Information¶
Linux reports things in a very detailed way. There are several places to look when you encounter problems with your system, most of which are standard to Linux systems in general, and some of which are relevant to openSUSE systems. The two most important system logs are /var/log/boot.msg and/var/log/messages.
A list of the most frequently checked log files follows with the description of their typical purpose. Paths containing~ refer to the current user's home directory.
Table 9.1. Log Files¶
Log File
Description
~/.xsession-errors
Messages from the desktop applications currently running.
/var/log/apparmor/
Log files from AppArmor, see Part “Confining Privileges with Novell AppArmor” (↑Security Guide) for detailed information.
/var/log/boot.msg
Messages from the kernel reported during the boot process.
/var/log/mail.*
Messages from the mail system.
/var/log/messages
Ongoing messages from the kernel and system log daemon (when running).
/var/log/NetworkManager
Log file from NetworkManager to collect problems with network connectivity
/var/log/samba/
Directory containing Samba server and client log messages.
/var/log/SaX.log
Hardware messages from the SaX display and KVM system.
/var/log/warn
All messages from the kernel and system log daemon with the “warning” level or higher.
/var/log/wtmp
Binary file containing user login records for the current machine session. View it with last.
/var/log/Xorg.*.log
Various start-up and runtime logs from the X Window system. It is useful for debugging failed X start-ups.
/var/log/YaST2/
Directory containing YaST's actions and their results.
/var/log/zypper.log
Log file of zypper.

Apart from log files, your machine also supplies you with information about the running system. See Table 9.2: System Information With the /proc File System
Table 9.2. System Information With the /proc File System¶
File
Description
/proc/cpuinfo
Contains processor

You May Also Find These Documents Helpful

  • Good Essays

    The Notebook

    • 1033 Words
    • 5 Pages

    The Notebook is one of my favorite love movies of all time. The reason I love this movie so much is because that main characters Noah and Allie go through so many trials and finally end up together in the end. This movie I feel shows me how strong their love for each other really was and I now feel as if it is meant to be it will always find a way. Looking at the movie as a reference to get a better understanding of how lifespan development works, I realized that most of the trials that Noah and Allie went though were part of stages of development. The theory of stages of development was created by Erik Erikson, he believes that we go though certain stages in our life and if we do not get passed them properly we will end up with underdeveloped skills in our lives. The Notebook has many different stages that the main characters go though such as, stage eight, integrity vs. despair, stage five, identity vs. identity confusion, and stage six, intimacy vs. isolation.…

    • 1033 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    NT1230 Lab 10

    • 1546 Words
    • 8 Pages

    12. Take a screen shot showing of the Event Viewer console, showing the Critical & Warning custom view by pressing Alt+ Prt Scr, and then paste the resulting image into the Lab10_worksheet file in the page provided by pressing Ctrl + V.…

    • 1546 Words
    • 8 Pages
    Satisfactory Essays
  • Powerful Essays

    Which of the following Linux utilities lists the names of files in a single directory?…

    • 2385 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    You can use the which. whereis, and locate utilities to search for files. The VIM…

    • 344 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 1 Study Guide

    • 846 Words
    • 4 Pages

    27. In a command line, what is the purpose of the ? in a filename?…

    • 846 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The protocol being used during web browsing. The HTTP Service is a kernel mode driver. Upon service failure, the error is logged. Windows 8 startup proceeds, but a message box is displayed informing you that the HTTP service has failed to start.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit 2 NT1430

    • 377 Words
    • 2 Pages

    1. Is each of the following an absolute pathname, a relative pathname, or a simple filename?…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    * Authentication failures are one type of security event. A baseline anomalies that may indicate suspicious activity are unauthorized access attempts that can be found within log files. The log files contain records of all types of security events such as logon events, changes in system configuration and attempted violations of policy as well as system events like service startups and closures, errors and system warnings.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    |File – Is a place where data is stored on a computer, there are many different types of files and most if not all data is stored in a file. |…

    • 829 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1430 Unit 5 exercise

    • 582 Words
    • 2 Pages

    Q1 By default, email addressed to system goes to root. How would you also save a copy in /var/logs/systemmail?…

    • 582 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    VUT2 Task 1 Memo CheckList

    • 1884 Words
    • 7 Pages

    network sniffing capabilities, was installed that captured the keystrokes of the user, thus obtaining user…

    • 1884 Words
    • 7 Pages
    Better Essays
  • Good Essays

    It250

    • 272 Words
    • 2 Pages

    Which of the following Linux utilities lists the names of files in a single directory?…

    • 272 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    70-640 Lesson 11

    • 1132 Words
    • 5 Pages

    __b__ 8. This is used as a reference file in case the Active Directory database needs to be recovered from a system failure to ensure that no transactions are lost.…

    • 1132 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Time - if all or an of these signs are noticed then you must call help immediately (999)…

    • 965 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Yu Ijkjkji

    • 72003 Words
    • 289 Pages

    The following tables group alarms and conditions by their default severities in the ONS DWDM system. These severities are the same whether they are reported in the CTC Alarms window severity (SEV) column or in TL1.…

    • 72003 Words
    • 289 Pages
    Powerful Essays

Related Topics