09-26-2011
How is the application rotating the logs ?
Does it copy and make it zero size or something like that ?
If the files get zeroed after rotation, then you can use ACL to give read permission to another user, beside root.
If the app creating (as root) new filename (log), then you will need to setup your application to make the neccesary permission changes after rotation.
Hope that helps
Regards
Peasant.
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Does any one now if you can change permissions on a linked file with out completely removing it and then relinking it? (2 Replies)
Discussion started by: moviestud80
2 Replies
2. Shell Programming and Scripting
I want to do just what the title says. Here's why:
I am adapting a script that backups to a mount. In the script it has a catch where if the drive isn't RW then it unmounts and attempts to remount RW.
# attempt to remount the RW mount point as RW; else abort
$MOUNT -o remount,rw... (3 Replies)
Discussion started by: Movomito
3 Replies
3. UNIX for Dummies Questions & Answers
Hi,
Within a SQL file i am calling 5 shell scripts in back ground and redirecting their outputs to different log files in a specific directory.
Now when I observed is, the log files are created with different permissions even though i did not do any thing specific.
For example in... (3 Replies)
Discussion started by: steria_learner
3 Replies
4. Shell Programming and Scripting
Hi All,
I am completely stuck here.
I have a set of files (with names A.txt, B.txt until L.txt) which contain words like these:
computer
random access memory
computer networking
mouse
terminal
windows
All the files from A.txt to L.txt have the same format i.e. complete words in... (2 Replies)
Discussion started by: shoaibjameel123
2 Replies
5. UNIX for Dummies Questions & Answers
Hi,
If User1, User2 and User3 are in the same group. User1 should not be able to view the files of User2 and User3. But User2 and User3 should be able to view all files.
How to set permission for this.
Please help.
Thanks,
Priya. (1 Reply)
Discussion started by: banupriyat
1 Replies
6. Red Hat
Hello All,
I have an application that creates the log files and they created with 600 permissions instead of 644(default). How can I set the permissions so that files can be created with 644. I looked into the /etc/profile for the umask settings and it is set 002(if UID>199). And when I type... (5 Replies)
Discussion started by: s_linux
5 Replies
7. Solaris
Hi!
I have a dir in a server, that receives files with the wrong permissions, so I decide to put on a cron entry that changes its permitions, but because of the time gap, not all of them get changed.
What I did was the following:
... (14 Replies)
Discussion started by: fretagi
14 Replies
8. Shell Programming and Scripting
Hi,
I am looking for a shell script which serves the below purpose.
Please find below the algorithm for the same and any help on this would be highly appreciated.
1)set of strings need to be replaced among set of files(directory may contain different types of files)
2)It should search for... (10 Replies)
Discussion started by: Amulya
10 Replies
9. Solaris
I want to set ACL permissions using this command in solaris 10 , but I get an error message.
server# mkdir dir1
server# setfacl -m user:allan:rwx dir1
setacl error: Operation not applicable
Any one can help in this matter.
Please use CODE tags as required by forum rules! (2 Replies)
Discussion started by: AbuAliiiiiiiiii
2 Replies
LEARN ABOUT OPENSOLARIS
ds.log
ds.log(4) File Formats ds.log(4)
NAME
ds.log - Availability Suite data services log file
DESCRIPTION
The /var/adm/ds.log file contains the Availability Suite data services command log. The administration commands log activities to the file
in the format:
date time product: message
Note that when the size of the log file exceeds 10 Mbytes, ds.log is renamed /var/adm/ds.log.bak and a new /var/adm/ds.log file is cre-
ated.
The ds.log fields are:
date
The date format is mmm nn, where mmm is the local three-character abbreviation for the month and nn is the day of the month on which
the event occurred.
time
The time of the event, in hh:mm:ss format.
product
A product code that identifies which component of the data services produced the event. The code is separated from the message that
follows by a colon (:) and a space.
message
A message that can extend over more than one line describing the event that occurred. The second or following lines are not pre-
fixed by the date, time, and product code strings.
EXAMPLES
The example below shows sample ds.log file content:
Jan 25 05:26:17 ii: iiboot suspend cluster tag <none>
Jan 25 05:32:02 ii: iiboot resume cluster tag <none>
Jan 25 05:32:04 sv: svboot: resume /dev/vx/rdsk/bigmaster
Jan 25 05:32:04 sv: svboot: resume /dev/vx/rdsk/bigshadow
Jan 25 05:32:04 sv: svboot: resume /dev/vx/rdsk/mstvxfs
Jan 25 05:32:04 sv: svboot: resume /dev/vx/rdsk/master01
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+---------------------+---------------------------------------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+---------------------+---------------------------------------------------------+
|Architecture | x86 |
+---------------------+---------------------------------------------------------+
|Availability | SUNWscmu |
+---------------------+---------------------------------------------------------+
|Interface Stability | Committed |
+---------------------+---------------------------------------------------------+
SEE ALSO
iiadm(1M), sndradm(1M), svadm(1M), attributes(5)
SunOS 5.11 08 Jun 2007 ds.log(4)