Sponsored Content
Full Discussion: AIX system logs files
Operating Systems AIX AIX system logs files Post 302967049 by Bolou on Friday 19th of February 2016 03:45:23 AM
Old 02-19-2016
Quote:
Originally Posted by SkySmart
errpt is a good command to use.

also, for the location of the log file where you can find records of the items listed, look in /var/adm/. in this directory, you'll find most files you need to look into.
thks you very much, i'll see in this directory and i'll come back to you if i have to know others thing...

---------- Post updated at 03:45 AM ---------- Previous update was at 03:35 AM ----------

Quote:
Originally Posted by bakunin
There are no logs as these are single commands which have a return code (and some diagnostic messages in case something goes wrong). You might want to write some script wrapper for them and write a log file yourself.

ok, but are not there a default log file locally for this ? am i neccesary obliged to make a script before ?

This is not clear enough. The fact that a password is changed is noted in /etc/security/passwd, a file in stanza format, with a lastupdate= entry. Note that this only pertains to locally authenticated users. LDAP-, Kerberos-, ... -users where the AIX system relies on some external system for the authentication do not have password-information on the system and therefore no pasword-update-information.

You might want to read up about "LAM" ("loadable authentication modules") for details.



That depends on what you want to know. The lsuser command provides information about the attributes "unsuccessful_login_count". "host_last_unsuccessful_login" and some others (issue lsuser root as root for a complete list of user attributes). You can also configure some authentication mechanisms to use the syslog facilities to write logs. There is nothing out of the box, though, because "authentication" is a loadable, configurable and quasi-external service for AIX.



Is logged in the error log. As a root user enter errpt for an overview and errpt -a for a detailed description of every entry (including shutdown/boot events).

ok, thks
I hope this helps.

bakunin
thks you for all your replies, i understand aix system logs file more and more.....
 

10 More Discussions You Might Find Interesting

1. Solaris

system logs' life

How can you control old system logs keep(or storage) time in Solaris ? Is there any method ? it depends on buffer size long or date long ? (1 Reply)
Discussion started by: xramm
1 Replies

2. AIX

location of logs on AIX 4.3 and 5.3

Hi All, I would like to know where's the location of ALL system error logs on AIX43 and AIX53. Thanks, itik (1 Reply)
Discussion started by: itik
1 Replies

3. AIX

System Logs

Dear Gurus I am running AIX with several users that are using the system, i would like to monitor the commands that are run by these users. Is there a log system that records the commands that are executed by the users??? Any kind of help will be appreciated. Regards Masquerder (6 Replies)
Discussion started by: masquerer
6 Replies

4. AIX

How to transfer files from AIX to AS400/i-series Integrated File System

Hi all, We (AIX) currently mount to a ZFS on the Mainframe. When one of our local users wants to transfer a file to the Mainframe, they must first run binary MVSLOGIN passing user name and password. Our mainframe will be retired soon and business processes will be transferring to an... (2 Replies)
Discussion started by: cruiser
2 Replies

5. Solaris

logs for system shutdown

I am working on a SUN T2000 machine with Solaris 10 running on it. When I checked the system this morning, I found it to be turned off. The lastreboot command showed that the system had been shut down the previous night. I want to find out how the system was shut down. I have run hardware health... (2 Replies)
Discussion started by: batman727
2 Replies

6. AIX

system logs

good evening all dear all where i can find the system logs in AIX 5.3 (1 Reply)
Discussion started by: thecobra151
1 Replies

7. Shell Programming and Scripting

AIX system.... deleting files in remote directory after retrieving files

Hi Friends, I am new to this , I am working on AIX system and my scenario is to retrive the files from remote system and remove the files from the remote system after retreving files. I can able to retrieve the files but Can't remove files in remote system. Please check my code and help me out... (3 Replies)
Discussion started by: vinayparakala
3 Replies

8. Red Hat

Writing to System Logs

This isn't a RedHat specific question. The software in question might be used for any Linux distribution. Would it be advisable or inadvisable for my application, to be downloaded by many people I don't know, to write to the following logs in /var/log? maillog or mail.log messages secure ... (10 Replies)
Discussion started by: Brandon9000
10 Replies

9. AIX

Accessing files on AIX system from Linux system

I have a following requirement in production system 1 : LINUX User: abcd system 2: AIX (it is hosting a production DB) Requirement user abcd from system 1 should have read access on archive log files created by DB on system 2. The log files are created with permissions 540 by user ora ,... (2 Replies)
Discussion started by: amitnm1106
2 Replies

10. UNIX for Beginners Questions & Answers

Daemon logs in AIX

I have to enable sftp and scp daemon logs in AIX 7.1. Currently only ftp daemons are being logged. What are the steps for doing so? Also programs such as filezilla uses sftp service to log into AIX. How do I ensure that sftp/scp continues to function after making change? Also needs to know what... (3 Replies)
Discussion started by: pregmi
3 Replies
pam_console(8)						   System Administrator's Manual					    pam_console(8)

NAME
pam_console - determine user owning the system console SYNOPSIS
session optional pam_console.so auth required pam_console.so DESCRIPTION
pam_console.so is designed to give users at the physical console (virtual terminals and local xdm-managed X sessions by default, but that is configurable) capabilities that they would not otherwise have, and to take those capabilities away when the are no longer logged in at the console. It provides two main kinds of capabilities: file permissions and authentication. When a user logs in at the console and no other user is currently logged in at the console, pam_console.so will run handler programs speci- fied in the file /etc/security/console.handlers such as pam_console_apply which changes permissions and ownership of files as described in the file /etc/security/console.perms. That user may then log in on other terminals that are considered part of the console, and as long as the user is still logged in at any one of those terminals, that user will own those devices. When the user logs out of the last terminal, the console may be taken by the next user to log in. Other users who have logged in at the console during the time that the first user was logged in will not be given ownership of the devices unless they log in on one of the terminals; having done so on any one terminal, the next user will own those devices until he or she has logged out of every terminal that is part of the physical console. Then the race can start for the next user. In practice, this is not a problem; the physical console is not generally in use by many people at the same time, and pam_console.so just tries to do the right thing in weird cases. When an application attempts to authenticate the user and this user is already logged in at the console, pam_console.so checks whether there is a file in /etc/security/console.apps/ directory with the same name as the application servicename, and if such a file exists, authentication succeeds. This way pam_console may be utilized to run some system applications (reboots, config tools) without root pass- word, or to enter user password on the first system login only. ARGUMENTS
debug turns on debugging allow_nonroot_tty gain console locks and change permissions even if the TTY's owner is not root. handlersfile=filename tells pam_console.so to get the list of the handlers from a different file than /etc/security/console.handlers EXAMPLE
/etc/pam.d/some-system-tool: auth sufficient pam_rootok.so auth required pam_console.so /etc/pam.d/some-login-service: auth sufficient pam_console.so auth required pam_unix.so session required pam_unix.so session optional pam_console.so FILES
/var/run/console/ /var/run/console/console.lock /etc/security/console.apps /etc/security/console.handlers SECURITY NOTES
When pam_console "auth" is used for login services which provide possibility of remote login, it is necessary to make sure the application correctly sets PAM_RHOST variable, or to deny remote logins completely. Currently, /bin/login (invoked from telnetd) and gdm is OK, others may be not. SEE ALSO
console.perms(5) console.apps(5) console.handlers(5) pam_console_apply(8) /usr/share/doc/pam*/html/index.html BUGS
Let's hope not, but if you find any, please report them via the "Bug Track" link at http://bugzilla.redhat.com/bugzilla/ AUTHORS
Michael K. Johnson <johnsonm@redhat.com> Support of console.handlers and other improvements by Tomas Mraz <tmraz@redhat.com> Red Hat 2005/10/4 pam_console(8)
All times are GMT -4. The time now is 11:24 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy