Logging

Red Hat Enterprise Linux 7    |    Intermediate
  • 8 videos | 43m 36s
  • Earns a Badge
Rating 4.6 of 87 users Rating 4.6 of 87 users (87)
As a Linux administrator, you must know how the logging system works. Learn about the Red Hat system logs, and how to access and use them.

WHAT YOU WILL LEARN

  • List the location of log files and the purpose of the common logs
    View and analyse log files and interpret basic values from other journal sources
    Review systemd journal logs
    Configure systemd journals to forward system messages to traditional system logging tools
  • Store and archive logs
    Configure what is logged to system logs
    Modify the system log settings and retention policies
    Use renice to change a processes priority, change a network adaptors ip address and check the logs for any unauthorized access attempts

IN THIS COURSE

  • 4m 19s
    Upon completion of this video, you will be able to list the locations of log files and the purposes of the common logs. FREE ACCESS
  • 5m 48s
    Learn how to view and analyze log files and interpret basic values from other journal sources. FREE ACCESS
  • Locked
    3.  Reviewing SystemD System Logs
    6m 28s
    In this video, you will learn how to review journal logs for SystemD. FREE ACCESS
  • Locked
    4.  Using SystemD JournalD with Syslog
    4m 3s
    In this video, you will configure SystemD journals to forward system messages to traditional system logging tools. FREE ACCESS
  • Locked
    5.  Storing and Archiving Logs
    6m 56s
    Learn how to store and archive logs. FREE ACCESS
  • Locked
    6.  Controlling what is Logged
    6m 36s
    Find out how to configure what is logged to the system logs. FREE ACCESS
  • Locked
    7.  Changing Logs and Log Settings
    4m 29s
    In this video, you will learn how to modify the system log settings and retention policies. FREE ACCESS
  • Locked
    8.  Exercise: Change a Process Priority and Check Logs
    4m 57s
    Find out how to use renice to change a process's priority, change a network adapter's IP Address, and check the logs for any unauthorized access attempts. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 18 users Rating 4.4 of 18 users (18)
Rating 4.7 of 7 users Rating 4.7 of 7 users (7)
Journey Using Linux
Rating 3.0 of 1 users Rating 3.0 of 1 users (1)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 185 users Rating 4.7 of 185 users (185)
Rating 4.6 of 137 users Rating 4.6 of 137 users (137)
Rating 4.6 of 84 users Rating 4.6 of 84 users (84)