News
Log files are the most valuable tools available for Linux system security. The logrotate program is used to provide the administrator with an up-to-date record of events taking place on the system.
The examples described in this post work on Ubuntu and related Linux systems. Other systems might use different log file and configuration file names, but the process itself should be very similar.
Jack Wallen walks you through the process of setting up a centralized Linux log server using syslog-ng.
Logrotate's behavior is governed by its configuration files, which dictate how it manages specific log files. These files are usually located in /etc/logrotate.conf and /etc/logrotate.d/. Log rotation ...
If you really want to see what's happening beneath the hood of your Linux distribution, you need to use log files.
It's not hard to look up configuration details on your Linux system. The hard thing is wrapping your brain around how many are available and what they can tell you.
Core concept: OSTree stores full system snapshots in a content-addressed manner, like Git for binary trees. Updates are ...
With Ubuntu, like any operating system, obsolete or unnecessary files are not automatically destroyed. However it is possible to remove them and to save space using packages.
Results that may be inaccessible to you are currently showing.
Hide inaccessible results