08-16-2013
Quote:
Originally Posted by
ramky79
Hello,
In our environment some users mess up with the system ( install / uninstall ) software..
unfortunately the root is open to several users (several of them have sudo access)
How to track which user is trying to do this ( I'd like to know which user and what ipaddress. )
Experts please shed some light; how to approach to take control of the situation (systems) and avoid future incidents.
Thanks,
R
Check the authentication log (
/var/log/auth.log). It will tell you who logged in to your server, when, and what he/she did.
Alternatively you can also check their respective history files to see what commands they ran.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
hi there,
does anyone know how to kick a telneted user from a the system?
thx (3 Replies)
Discussion started by: crashnburn
3 Replies
2. UNIX for Advanced & Expert Users
The directions below were provided by someone on the unslung mailing list. unslung is a linux OS for LinkSys's $100 NSLU2 NAS controller.
I'm posting the query here because
(1) I think it is really a generic linux/unix questions
(2) I did not get a response in the unslung mailing list.
I... (1 Reply)
Discussion started by: siegfried
1 Replies
3. Solaris
Hi,
I'm new to solaris/ Unix and would like to know how to check in the system what
was the last login user were doing. Is there any way to check this? Thanks in advanced. (1 Reply)
Discussion started by: raziayub
1 Replies
4. UNIX for Advanced & Expert Users
Helo,
I have created one group called RBAC.(roll back access control)
Now when I created user of RBAC its entry in /etc/passwd file is given below:
roleadm:x:120:109:RBAC User:/home/pds_RBAC:/bin/false
I have keep at the end /bin/false because I dont want to give direct login to the user... (2 Replies)
Discussion started by: amitpansuria
2 Replies
5. Solaris
Hi Everybody,
Can somebody tell me the difference between /etc/system and user profile???? (2 Replies)
Discussion started by: tirupathiraju_t
2 Replies
6. Shell Programming and Scripting
Not sure if that title is decent, but here we go. I'm running this string of commands:
qstat -f $1 | sed 's/^*//' | sed -n -e ":a" -e "$ s/\n//gp;N;b a" | sed 's/\\,/,/' | awk -F"PBS_O_WORKDIR=" '{print $2}' | awk -F",PBS_O_SYSTEM" '{print $1}'In case you're curious is takes the output of a PBS... (3 Replies)
Discussion started by: dhibbit
3 Replies
7. Shell Programming and Scripting
Does anybody know how to keep SCCS from changing the wrong module keywords? I'm thinking of a don't translate after this line kind of operation.
I see where you can use get with a -k but then no keywords get translated. It's either all or none.
I use simply
# %A%
# %G% %T%
in all my... (1 Reply)
Discussion started by: Back-N-Black
1 Replies
8. Programming
Hello,
I'm implementing a very simple FTP client, and to do the login I would like to check against system users instead of using my own database, so that I can give the proper permissions to the newly created process that I spawn with fork. What's the best way for doing this in C?
I've read... (4 Replies)
Discussion started by: royger
4 Replies
9. Shell Programming and Scripting
i am prompting for a name to search.
read user
if
then
however, i get this error:
please enter a username on the system:
fool
menu_script2.sh: line 123: (4 Replies)
Discussion started by: icelated
4 Replies
10. IP Networking
I noticed my hostname is <my-full-name>s-macbook.local. I'm not sure exactly what information leaves the local network, and whether the hostname is included, but if it is, this would mean people on the Internet can look at my hostname and see who I am. Before anyone says that's not possible,... (4 Replies)
Discussion started by: Ultrix
4 Replies
log(8) System Manager's Manual log(8)
NAME
log - Records input and output from a program
SYNOPSIS
/usr/sbin/log <logfile> <command>
OPERANDS
The file in which to record the interaction being logged. The command to execute.
DESCRIPTION
The log program runs <command> and logs the input to and output from <command> to the <logfile> file. Input and output are logged until
<command> exits, the log program exits, and the exit status of <command> is returned.
The log program is used by the system installation procedure and the it(8) command to create the /var/adm/smlogs/install.log and
/var/adm/smlogs/it.log installation log files.
RESTRICTIONS
Because the log program is used in the installation standalone environment, program size was the greatest concern in its implementation.
The log program does not search for the PATH variable to locate <command> and error messages are terse.
The log program causes <command> to take standard input from and write standard output and standard error to UNIX pipes. Some commands
will not be able to operate in this environment; therefore, it is suggested that you use the script(1) command instead. UNIX shells will
not issue prompts when run from log unless the shell is started with an explicit interactive switch (-i for most shells). For example, log
foo.tmp /sbin/sh -i
In the previous example, foo.tmp is the name of <logfile>.
The log program intercepts end-of-file (usually Ctrl/d). Therefore programs which normally receive end-of-file as an exit command must
exit by some other means.
ERRORS
Log open error
Explanation:
The log program was unable to open <logfile>. Verify that the directory exists and that ownerships and permissions are set correctly.
Exec Error
Explanation:
The log program was unable to execute <command>. Verify that you specified a full pathname for <command> and that <command> is an exe-
cutable file.
Fork Error
Explanation:
The log program was unable to create one of the processes it requires to log data.
SEE ALSO
Commands: it(8), script(1)
log(8)