Sponsored Content
Full Discussion: Network activity log
Operating Systems Linux Red Hat Network activity log Post 302977166 by Peasant on Wednesday 13th of July 2016 12:44:11 PM
Old 07-13-2016
Well there is always :
Code:
netstat 
tcpdump

With those utilities you can determine failures on network level.
Does syslog or messages indicate network failovers or similar ?
Have you check switch port logs for errors ?

Can you elaborate on 'some fluctuation' ?
 

9 More Discussions You Might Find Interesting

1. AIX

how to log DNS activity?

I have DNS server with AIX 5.2 and need help in logging DNS activity to a file, in other words, I want to log the information of all the machines that resolves via DNS server along with their timestamp (like what time it resolved). Any help is very much appreciated. Thanks (3 Replies)
Discussion started by: mbak
3 Replies

2. AIX

Monitoring the network activity happening in a port in AIX 5.3

Hi All, I would like to monitor the volume of Data that is transferred through a single port in AIX. I have nmon installed in my machine. What is the best possible solution for this problem. Thanks in Advance. (3 Replies)
Discussion started by: bravo13
3 Replies

3. IP Networking

how to identify network activity?

Hi there, I have a computer that is not a server. I mean it should have no network activity as it is meant to display videos and not to provide any ftp, web or whatever service. The probleme is that the computer actualy reports a constant network activity. How can I identify the processes that... (1 Reply)
Discussion started by: chebarbudo
1 Replies

4. Solaris

Making a Log of user activity in Solaris 10

My first post. I need a simple way to log user activity to a unique file for each user and also if any user su's to root, I would like to capture that activity and have it in the unique file for that user. (1 Reply)
Discussion started by: powerrack
1 Replies

5. UNIX for Dummies Questions & Answers

How to trace root's activity log

What is the command to check the activity of all users with root access on a Unix platform? Right now, there is like about 20 users with root and someone accidentally made some changes to the crontab and I need to trace which user did it. (5 Replies)
Discussion started by: hedkandi
5 Replies

6. SuSE

How to log Installation-Activity ??

Hi @ All, short question: i want to log my cpan Installation in a text-File. My first try was cpan -i module | tee /home/install.txt but this donīt logs my inputs, eg. what i typed in when cpan asks where are my progs or which mirror i want. Can somebody help me with this? Regards, ... (1 Reply)
Discussion started by: jackcracker
1 Replies

7. IP Networking

Illegal network activity

Hi, I have a wireless router connecting both windows and linux systems at home. I've discovered someone has been downloading illegal content on my network simply because they accidentally left the torrent downloader on their screen when showing me something. I removed their access for a few days... (1 Reply)
Discussion started by: neil999
1 Replies

8. Shell Programming and Scripting

need perl script to get a comprehend statistic of network activity in a LAN

need perl script to get a comprehend statistic of network activity in a LAN. The purpose is to get each indivisual data usages statistics so that I can determine who is doing the network congestion in terms of bandwidth usages both in real time and retrospectively.. Thanks in... (4 Replies)
Discussion started by: rrd1986
4 Replies

9. OS X (Apple)

> or | log file to another network volume: help needed

My UNIX skills amount to "Google,Copy,Paste..." but I managed to get a useful log file generated by an automation system that runs 24/7. The log file exists on an Omneon Media Grid server where I monitor it via "tail -F /..." Unfortunately we have many workstations running Tiger 10.4.8 still and... (2 Replies)
Discussion started by: SolarDarkroom
2 Replies
syslog(8)						      System Manager's Manual							 syslog(8)

Name
       syslog - log systems messages

Syntax
       /etc/syslog [ -mN ] [ -fname ] [ -d ]

Description
       The command reads a datagram socket and logs each line it reads into a set of files described by the configuration file The command config-
       ures when it starts up and whenever it receives a hangup signal.

       Each message is one line.  A message can contain a priority code, marked by a digit in angle braces at the beginning of the line.   Priori-
       ties are defined in < syslog.h >, as follows:

       LOG_ALERT    This  priority  should essentially never be used.  It applies only to messages that are so important that every user should be
		    aware of them, for example, a serious hardware failure.

       LOG_SALERT   Messages of this priority should be issued only when immediate attention is needed by a qualified system person, for  example,
		    when some valuable system resource disappears.  These messages are sent to a list of system people.

       LOG_EMERG    Emergency  messages  are  not  sent  to users, but represent major conditions.  An example might be hard disk failures.  These
		    could be logged in a separate file so that critical conditions could be easily scanned.

       LOG_ERR	    These messages represent error conditions, such as soft disk failures, etc.

       LOG_CRIT     Such messages contain critical information, but which can not be classed as errors, for example, `su' attempts.   Messages	of
		    this priority and higher are typically logged on the system console.

       LOG_WARNING  These messages are issued when an abnormal condition has been detected, but recovery can take place.

       LOG_NOTICE   These  messages  fall  into  the class of ``important information''; this class is informational but important enough that you
		    don't want to throw it away casually.  Messages without any priority assigned to them are typically mapped into this priority.

       LOG_INFO     These are information level messages.  These messages could be thrown away without problems, but should  be  included  if  you
		    want to keep a close watch on your system.

       LOG_DEBUG    These messages may be useful to log certain debugging information.	Normally this information is thrown away.

       It is expected that the kernel will not log anything below LOG_ERR priority.

       The  configuration  file is in two sections separated by a blank line.  The first section defines files that will log into.  Each line con-
       tains a single digit which defines the lowest priority (highest numbered priority) that this file will receive, an optional asterisk  which
       guarantees that something gets output at least every 20 minutes, and a pathname.  The second part of the file contains a list of users that
       will be informed on SALERT level messages.  For example, the following logs all messages of priority 5 or higher onto the  system  console,
       including timing marks every 20 minutes:
       5*/dev/console
       8/usr/spool/adm/syslog
       3/usr/adm/critical

       eric
       kridle
       kalash

       This  example  logs  all  messages  of priority 8 or higher into the file and all messages of priority 3 or higher into The users ``eric'',
       ``kridle'', and ``kalash'' will be informed on any subalert messages.

       The flags are:

       -m   Set the mark interval to N (default 20 minutes).

       -f   Specify an alternate configuration file.

       -d   Turn on debugging (if compiled in).

       To bring down, it should be sent a terminate signal.  It logs that it is going down and then waits approximately 30 seconds for	any  addi-
       tional messages to come in.

       There  are  some special messages that cause control functions.	``<*>N'' sets the default message priority to N.  ``<$>'' causes to recon-
       figure (equivalent to a hangup signal).	This can be used in a shell file run automatically early in the morning to truncate the log.

       The command creates the file if possible containing a single line with its process ID.  This can be used to kill or reconfigure

Restrictions
       LOG_ALERT and LOG_SUBALERT messages should only be allowed to privileged programs.

       Actually, can not deal with kernel error messages in the current implementation.

Files
       Configuration file

       Process id

See Also
       syslog(3)

																	 syslog(8)
All times are GMT -4. The time now is 03:12 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy