Sponsored Content
Top Forums UNIX for Advanced & Expert Users Is it, and if so, how is it possible to intercept system messages going to SYSLOG Post 302301139 by bennerg on Thursday 26th of March 2009 03:44:37 AM
Old 03-26-2009
It is the PAM Authentication module I guess, and I *really* don't want to go there.

I guess I could call what I want a "sniffer" on the stream of syslog messages, somewhat analogous to an ethernet sniffer, where you just look at the data, and don't interfere with it in any way.

kind regards

gary
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

system messages log (Sun and AIX)

Hello, I need a few explanation about the log files for system messages: /var/adm/messages and /var/log/syslog. As /var/adm/messages is empty on my machine, i need help. First, i would like to know what the difference between these 2 files is? Do they contain different kinds of system... (3 Replies)
Discussion started by: VeroL
3 Replies

2. UNIX for Advanced & Expert Users

System Error messages

Hi Experts, I'm getting the following errors on /var/adm/messages file permanently. Dec 28 10:19:38 ioocsrv1 bsd-gw: open(dfA415ioocsrv3): File exists Dec 28 10:20:53 ioocsrv1 bsd-gw: open(dfA415ioocsrv3): File exists Dec 28 10:22:08 ioocsrv1 bsd-gw: open(dfA415ioocsrv3): File exists Dec... (1 Reply)
Discussion started by: nikk
1 Replies

3. IP Networking

intercept the ip address of a telnet session

The situation: a Unix system (UnixWare 7.1.3) to which are connected other systems; various p.c. on the LAN that they connect Unix to the system via TelNet. The problem: I need to intercept the address IP of the p.cs. connected via telnet to the Unix system. Particularly, I have to know the... (2 Replies)
Discussion started by: paololrp
2 Replies

4. Shell Programming and Scripting

Script to send something via UDP and intercept at other end?

I am looking to do a shell script that can send something simple via UDP from server 1 - to server 2 I want to be able to see on server 2 that I received everything expected.. ie.. I am looking at this to avoid using ping / traceroute to highlight network issues.. if a UDP packet gets lost... (1 Reply)
Discussion started by: frustrated1
1 Replies

5. AIX

How to intercept sytem calls

I would like to port a small utility from Linux to AIX and, lacking any software development knowledge for AIX, need some help: I have a library called Snoopy. Basically it intercepts the execv() and execve() system calls and logs them to the syslog-facility AUTHPRIV then passes control over to... (1 Reply)
Discussion started by: bakunin
1 Replies

6. Red Hat

syslog messages.

Good Day. Any idea on the messages log. it would be a great help to us. Upon checking the on the system logs, I found the following messages: EXT3-fs: INFO: recovery required on readonly filesystem. EXT3-fs: write access will be enabled during recovery. kjournald... (1 Reply)
Discussion started by: cabloy
1 Replies

7. UNIX for Advanced & Expert Users

Video Cards :: Video Memory Intercept and Redirect

I need a broad spectrum understanding on this subject, and any help would be greatly appreciated. First of all, as I understand it... The way the video hardware works is the CPU sends information about input and possible changes to the display, the video card receives these changes, makes the... (2 Replies)
Discussion started by: ciNG
2 Replies

8. Homework & Coursework Questions

program to send messages to parent using pipes and select system call

Write a program using select, which will create some number of child processes that continuously send text messages to the parent process using pipes. Each child has its own pipe that it uses to communicate with the parent. The parent uses select () to decide what pipes should be processed to... (1 Reply)
Discussion started by: ripssingh
1 Replies

9. UNIX for Advanced & Expert Users

Scan all mail messages through the server and save a copy into file system following a rule

In our company we work for our customer with a job# philosophy, managing all the informations about a job in a share with directories whose name is starting with job number. Under this entry point we have a standard structure of folders, comprising a "communications" folder. When we send emails... (0 Replies)
Discussion started by: vroby67
0 Replies

10. Solaris

Svc messages flooding the system logs every second

Hi all I have a newly installed Oracle X2-4 server running Solaris 10 x86 with the latest patches. I have one non-global zone configured running an Oracle DB instance. After configuring IPMP failover between two NICs on the server and rebooting I am seeing the /var/adm/messages being flooded... (7 Replies)
Discussion started by: notreallyhere
7 Replies
CRON(8) 						      System Manager's Manual							   CRON(8)

NAME
cron - daemon to execute scheduled commands (ISC Cron V4.1) SYNOPSIS
cron [-l load_avg] [-n] DESCRIPTION
Cron should be started from /etc/rc or /etc/rc.local. It will return immediately, so you don't need to start it with '&'. The -n option changes this default behavior causing it to run in the foreground. This can be useful when starting it out of init. Cron searches /var/spool/cron for crontab files which are named after accounts in /etc/passwd; crontabs found are loaded into memory. Cron also searches for /etc/crontab and the files in the /etc/cron.d directory, which are in a different format (see crontab(5)). Cron then wakes up every minute, examining all stored crontabs, checking each command to see if it should be run in the current minute. When execut- ing commands, any output is mailed to the owner of the crontab (or to the user named in the MAILTO environment variable in the crontab, if such exists). Additionally, cron checks each minute to see if its spool directory's modtime (or the modtime on /etc/crontab) has changed, and if it has, cron will then examine the modtime on all crontabs and reload those which have changed. Thus cron need not be restarted whenever a crontab file is modified. Note that the Crontab(1) command updates the modtime of the spool directory whenever it changes a crontab. Daylight Saving Time and other time changes Local time changes of less than three hours, such as those caused by the start or end of Daylight Saving Time, are handled specially. This only applies to jobs that run at a specific time and jobs that are run with a granularity greater than one hour. Jobs that run more fre- quently are scheduled normally. If time has moved forward, those jobs that would have run in the interval that has been skipped will be run immediately. Conversely, if time has moved backward, care is taken to avoid running jobs twice. Time changes of more than 3 hours are considered to be corrections to the clock or timezone, and the new time is used immediately. PAM Access Control On SUSE LINUX systems, crond now supports access control with PAM - see pam(8). A PAM configuration file for crond is installed in /etc/pam.d/crond . crond loads the PAM environment from the pam_env module, but these can be overriden by settings in the crontab file. SIGNALS
On receipt of a SIGHUP, the cron daemon will close and reopen its log file. This is useful in scripts which rotate and age log files. Naturally this is not relevant if cron was built to use syslog(3). CAVEATS
In this version of cron, /etc/crontab must not be writable by any user other than root. No crontab files may be links, or linked to by any other file. No crontab files may be executable, or be writable by any user other than their owner. SEE ALSO
crontab(1), crontab(5), pam(8) AUTHOR
Paul Vixie <vixie@isc.org> 4th Berkeley Distribution 10 January 1996" CRON(8)
All times are GMT -4. The time now is 01:19 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy