mac Log종류

간략하게 로그의 종류들을 설명한 페이지

http://www.mactech.com/articles/mactech/Vol.23/23.03/2303Shell-WhichLog/index.html

Volume Number: 23 (2007)
Issue Number: 03
Column Tag: Mac in the Shell

Mac In The Shell — Which Log?

Following up on which log shows you what

by Edward Marczak

 

Introduction

I’ve had incredible response to my last two columns that talked about logs: what they are, how to interpret them and how to notify yourself if a log is telling you something important. More than any other question, however, people have asked, “which log does what?� While I gave an overview of some logs, there are plenty more that I haven’t gone into, and more locations for logs than I could describe previously. That’s what I’ll be following up on this month. So, read on for even more on logs.

 

Kinda I Want To

Just as a review for anyone who didn’t read the previous columns, logs are text files that running programs write to that keep track of their activity. Text files, that’s all. (OK, an app could keep a binary log, but for the most part, text it is). This allows other apps and, more importantly, humans to read their contents. Apps are free to deal with logging on their own, or, they can use syslog to hand off their data to the system logger. It’s a bit of a style issue, and usage is roughly split on which method is chosen. There’s nothing that says that an application can’t do both. Let’s look quickly again at the syslog method.

The system logger, aka “syslog�, is a daemon run at boot that should be running all of the time. It listens for logging data locally, and knows where to put a logging entry based on its configuration file /etc/syslog.conf. “syslogd� can also be setup to listen for logging data from other machines as well. Log data can be categorized by facility and level (a “selector�). The facility is basically where the data is coming from (“mail�, “ftp�, etc., along with some generic facilities). The level describes the severity of the log message. The currently defined levels are:

Emergency (level 0) Alert (level 1) Critical (level 2) Error (level 3) Warning (level 4) Notice (level 5) Info (level 6) Debug (level 7)

(Don’t you love it when things neatly fit into a byte?) Looking at /etc/syslog.conf, you can then see which messages will be directed to which files. Note that some will go to multiple files.

This is a bit of a review, as all of this (and more) was covered in previous articles in this column.

 

Down In It

Apple has created a little bit of a split with logging: “Unix-y� files in /var/log, and everything else. While that may be a bit of an overgeneralization, it’s a good general guideline.

syslogd, as you can see from /etc/syslog.conf, will dump just about everything in some log residing in /var/log. Additionally, several non-syslog sending services also drop their files somewhere into the /var/log hierarchy. The two big notables in this category would be apache � logging into /var/httpd � and samba, which logs into /var/samba. You’ll also find some other non-syslog-ish files hanging around in /var/log, and we’ll address those a little later.

The other place you’ll find good logging information falls into the “everything else� category. You’ll find these in /Library/Logs or ~/Library/Logs. System processes will log to /Library/Logs and user processes, when the user home directory is writable, will log to ~/Library/Logs. For example, anything that needs admin level rights to run � AFP logs, Software Update and, my favorite, Directory Services � will log to the System directory /Library/Logs. Other user-space apps � Logic, SyncServices, Parallels, etc. � will log into the user’s own Library/Logs.

If you’ve peeked into either of these directories, you’ll notice that there’s another category of logs: logs that get generated as the result of a crash.

 

Something I Can Never Have

For those of you obsessed with the running process list, you’ll no doubt have noticed the persistent /usr/libexec/crashreporterd. Apple’s crash reporter daemon hangs around waiting for an application to crash. Technically, it listens for a Mach exception to be generated, and, upon that happening, launches crashdump. crashdump then logs and reports the event to the user. If the user can be determined, and they have a writable home, the report goes into ~/Library/Logs/CrashReporter. You really forget how much stuff takes a dive until you peek in there:

Jack-Kerouac:~/Library/Logs/CrashReporter marczak$ ls -1
BOMArchiveHelper.crash.log
Cyberduck.crash.log
Dreamweaver.crash.log
Finder.crash.log
GrowlTunes.crash.log
Mail.crash.log
Now Up-To-Date.crash.log
Pages.crash.log
Parallels.crash.log
Preview.crash.log
Quicksilver.crash.log
Safari.crash.log
VirtueDesktops.crash.log
Workgroup Manager.crash.log
firefox-bin.crash.log
iSnip.crash.log
mdimportserver.crash.log
vmware.crash.log

Wow. When an app’s owner can’t be determined, is a system process, or the user’s home directory is not writeable, crashdump logs into /Library/Logs:

Jack-Kerouac:/Library/Logs/CrashReporter root# ls -1 
ARDAgent.crash.log
Exited process.crash.log
httpd.crash.log
iSnip.crash.log
loginwindow.crash.log

LoginWindow crash…I like that one! crashreporter itself, however, logs its actions into /var/log/crashreporter.log. Finally, crashreporterd is also responsible for writing panic logs when the system is rebooted after a panic � find the log at /Library/Logs/panic.log.

 

Terrible Lie

If you root around /var/log long enough, you’ll even start to notice some other files that aren’t syslog generated at all. The most notable of the bunch are daily.out, weekly.out and monthly.out. These log files are generated by the daily, weekly and monthly periodic jobs that run overnight (if your machine is up and running, but not necessarily logged in).

Also of note are wtmp and lastlog. Interestingly, these are binary log files, and must be read with another application. These are not present for troubleshooting per se, but instead track login activity. User IDs, along with their login time get written to lastlog. From there, the utmp file gets updated with the user login information, and the same utmp record gets written to /var/log/wtmp. users, w and who use utmp to provide their information, while last and ac use wtmp.

 

That’s What I Get

So, back to the original question: which logs record which bit of information? Here’s a 40,000 ft. view:

/var/log/system.log

Along with asl.log, these are the big kahunas. Most system related activity is logged here. Specifically, the following selectors log to system.log:

*.notice
authpriv,remoteauth,ftp,install.none
kern.debug
mail.crit

As mentioned in January, asl.log pretty much gets everything, and displays the facility and level with the log message.

/var/log/secure.log

Messages from Apple’s SecurityServer get logged here � along with anything in the authpriv facility. Good one to keep an eye on. Interestingly, though, some security-related information logs to system log as well (such as sshd authentication errors through PAM).

/var/log/mail.log and /var/log/mailaccess.log

Complimentary logs that describe mail (if you’re running OS X Server’s built-in mail � OS X �client’ also uses /var/log/mail.log). mail.log contains activity for postfix, SMTP sending and receiving while mailaccess.log contains cyrus’ imap and pop activity. mail.log is the place to look when clients are telling you that they sent mail that the intended recipients never received (mail going out), or that someone sends them e-mail which they themselves never received (mail coming in).

/Library/Logs/DirectoryService/*

Huge. HUGE I say! Anyone operating in an OD, AD or other LDAP-reliant environment should be checking here occasionally. Of course, if you’re trying to bind a workstation to a directory, and it’s just not working for some reason, this is the place to check. Don’t forget to throw DirectoryService into debug mode (killall -USR1 DirectoryService, logging to DirectoryService.debug.log), or use boot-time debugging (touch /Library/Preferences/DirectoryService/.DSLogDebugAtStart � which will also log to DirectoryService.debug.log) if the situation calls for it � covered in detail in past Mac In The Shell articles.

 

Logs that you don’t need explained

There are some logs that simply don’t need any explanation. These include:

/var/log/ftp.log (contents of the ftp server)
/var/log/httpd/* (Apache's log files)
/var/log/samba/* (Samba's log files)
/var/log/lpr.log (lpr printing activity)
/var/log/cups/* (CUPS web sever activity)
/Library/Logs/Software Update.log (Software Update install history)

/Library/Logs/AppleFileService � OK, perhaps this one does need some explanation. But not by me � from the engineers at Apple. This should be the Mecca of information that you reach for when you want to track activity coming in through AFP. However, details in this log are so sparse to render it useless. Despite the fact that AppleFileServer runs as one grand, monolithic process, we need it to give up the goods on what’s happening internally in these logs.

 

The mega-log

Remember, that you can always have all syslog messages be delivered to a single file by using a wildcard selector in /etc/syslog.conf:

*.*      /var/log/mega.log

…although asl.log is already catching most of that. Further remember that this will not capture everything else that is performing logging on its own and not using syslog/asl.

 

The Only Time

While I made a strong case for watching and examining logs using good �ol Unix tools � grep, tail and less � and I would still make that assertion, there are some other very useful tools out there.

 


Figure 1: Splunk searching for events (detail)
Console.app is the most obvious for us Mac users; it’s “built-in� and clearly Mac-like. I still think it’s a miserable way to follow log activity as it happens, but it is a fantastic tool for exploring the various logs that exist on the system. Fire up Console.app (located in the Utilities folder) and poke around. It’s a great learning experience.

I’ve found a newer tool on the market to also be very useful, and while it’s not Mac-specific, it’s nice that there’s an OS X version at all. Splunk is billed as a logfile search engine. It comes in a free version that will sift through up to 500MB of logs per day, and a paid version which not only removes that restriction altogether, but also adds Splunk-to-Splunk logging for log correlation across many machines, and also authentication which is missing in the free version.

Splunk alone could take up an entire column (and may very well one day soon); it is so easy to get going, that I’d recommend the download. Excellent documentation exists on the site as well. Of course, Splunk makes it really easy to search for events, but I’ve found that it’s a nice exploratory tool in general. Splunk quickly categorizes events and can let you filter on those events. Figure 1 shows the search engine, running in a browser, looking at event type 9 on my machine.

Even cooler, perhaps, is the ability to look at the frequency of events. Figure 2 shows the frequency of events that appear in the secure.log of my machine � clearly a good one to keep an eye on and reign in this kind of data.

 


Figure 2 � Splunk showing the frequency of various events that appear in a given source.
In a small-to-medium sized organization, you could set up a single server as a log host (check the prior logging articles for instructions) and have Splunk access that log. 500MB is a lot of logging information. Enough that you shouldn’t have a problem using the free version of Splunk.

 

Sanctified

So here’s the real story with logs: you can ignore them, sure. Then when a problem crops up, you can just tell your client/employer that this is just the way computers are. There are bugs, there are problems; such is life. If you watch the logs, you’ll know there’s a problem, and then you’ll actually have to do something about it.

Or, you can realize that this is the only way the system can speak to you and more often that not, you’re warned well in advance of any catastrophic problems. You can head these off at the pass. You can keep the system providing services without interruption and keep up with real work.

Of course, the unfortunate cases do arise where you need to ascertain what happened after the fact. Did that mail get sent? Did that volume bomb on space and then recover without us really knowing? Was someone trying to brute-force a login through ssh at the same time our web server was under attack? In those cases, knowing which logs to look in and how to read them are your only resource for piecing together information after an event took place.

Media of the month: you might suspect it would be some Nine Inch Nails title, however, I’d have to disappoint: that was only a passing fancy. The real Media of the Month is, “Innumeracy: Mathematical Illiteracy and Its Consequences� by John Allen Paulos. A book that I forgot I had until I lent it out. Easy, enjoyable, powerful reading.

WWDC time again! Apple has announced the dates (June 11th through the 15th, if you’d missed it), so, get ready. If you’re attending, I hope to see you there in person! Until then, though, I’ll see you in print next month…


Ed Marczak owns and operates Radiotope, a technology consultancy that brings enterprise solutions to small and medium-sized businesses. Outside of this piece of the puzzle, he is Executive Editor of MacTech Magazine, a husband and father, and CTO of WheresSpot, among other things. Find the missing tech piece at.

com.apple.wikid[1517]: AssertionError

TimeMachine 복구 이후, 서버 로그에서 꽤 빈도가 잦게 다음과 같은 로그가 발견…

com.apple.wikid[1517]: AssertionError

원인은 특정 디렉토리들이 유실되어 시스템에서 파일 접근을 하지 못하여 나타나는 현상…
이곳에서 답을 찾음…
http://discussions.apple.com/thread/4296215?start=0&tstart=0
해결 방법
http://support.apple.com/kb/TS2915

Mac OS X v10.5, Mac OS X Server v10.5: Web, Mail, Wiki, Personal Web Sharing, Parental Controls services may not start after restoring a Time Machine backup

Products Affected

Mac OS X 10.5, Mac OS X Server 10.5

Symptoms

After restoring from a Time Machine backup in Mac OS X v10.5 (client), Personal Web Sharing and the Parental Controls web filter may not start.

After restoring from a Time Machine backup on Mac OS X Server v10.5, Web, Wiki and Mail services may not start.

Resolution

Recreate folders that are not included in the Time Machine backup as described below.

To restore the Web service (server), Personal Web Sharing (client), and restore Internet access for users subject to the Parental Controls web filter (client):

  1. Open Terminal (in /Applications/Utilities).
  2. Execute these commands, each on its own line, followed by Return. Note: When using these commands you will be prompted for an administrator’s password.sudo mkdir /var/log
    sudo mkdir /var/log/apache2

     

  3. To restore the Wiki service (server), run the following commands in addition to those above:

    sudo mkdir /Library/Logs/wikid

    sudo chown _teamsserver:_teamsserver /Library/Logs/wikid
     
  4. To restore the Mail service (server), execute the following command:sudo /etc/postfix/post-install create-missing
  5. After running these commands, stop and restart each service, or restart your computer.

 

더불어… ical에서도 비슷한 로그 에러가 난다면…

Mac OS X Server: CalDav Log Fun

갑자기 시작된 Server ReInstall

시작은… 아마도 XGrid가 안되서였지?
정확하게는 Open Directory가 정상 동작하지 않는거 같아서…

Snow Leopard Server를 clean install하고 테스트하니 너무나도 깔끔하게 동작…
다시 인스톨하고 time machine으로부터 이전 데이터 migration하려 하니… 에러… 한번에 1시간 30분씩 도합 3번을 실패하고 나서야 문제가 있군! 인식..;;;
내친김에 Mac Lion Server를 다시 한번 설치해보려고 했으나 App Store오류?로 설치 진행이 되지 않음…
결국 USB에 Mac Lion을 이미지 넣어 부팅하여 설치하려다… 문득 Time Machine Restore가 있는걸 발견…. 3시간 정도에 걸친 복구 진행…
훌라~ 완벽하게 돌아왔다…
신기한건 Open Directory 및 XGrid도 정상적으로 된다…

결국, 이번에도 기존 데이터를 새 서버로 옮기는 과정이 쉽지 않을 것이라는 두려움에 OS 업그레이드 실패…

덧붙임 : 문제는 XGrid가 더 이상은 진행되지 않는 프로젝트라는것… 왜 갑자기 이걸 써보고 싶어졌던거지… -_-;;;