.\" .\" Copyright (c) 2000 Carnegie Mellon University. All rights reserved. .\" .\" Redistribution and use in source and binary forms, with or without .\" modification, are permitted provided that the following conditions .\" are met: .\" .\" 1. Redistributions of source code must retain the above copyright .\" notice, this list of conditions and the following disclaimer. .\" .\" 2. Redistributions in binary form must reproduce the above copyright .\" notice, this list of conditions and the following disclaimer in .\" the documentation and/or other materials provided with the .\" distribution. .\" .\" 3. The name "Carnegie Mellon University" must not be used to .\" endorse or promote products derived from this software without .\" prior written permission. For permission or any other legal .\" details, please contact .\" Office of Technology Transfer .\" Carnegie Mellon University .\" 5000 Forbes Avenue .\" Pittsburgh, PA 15213-3890 .\" (412) 268-4387, fax: (412) 268-7395 .\" tech-transfer@andrew.cmu.edu .\" .\" 4. Redistributions of any form whatsoever must retain the following .\" acknowledgment: .\" "This product includes software developed by Computing Services .\" at Carnegie Mellon University (http://www.cmu.edu/computing/)." .\" .\" CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO .\" THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY .\" AND FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE .\" FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES .\" WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN .\" AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING .\" OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. .\" .\" $Revision: 1.2 $ .\" Copyright (c) 1983, 1986 The Regents of the University of California. .\" All rights reserved. .\" .\" Redistribution and use in source and binary forms are permitted provided .\" that: (1) source distributions retain this entire copyright notice and .\" comment, and (2) distributions including binaries display the following .\" acknowledgement: ``This product includes software developed by the .\" University of California, Berkeley and its contributors'' in the .\" documentation or other materials provided with the distribution and in .\" all advertising materials mentioning features or use of this software. .\" Neither the name of the University nor the names of its contributors may .\" be used to endorse or promote products derived from this software without .\" specific prior written permission. .\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED .\" WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF .\" MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. .\" .\" @(#)syslogd.8 6.8 (Berkeley) 6/27/90 .\" .TH SYSLOGD 8 "June 27, 1990" .UC 5 .SH NAME syslogd \- log systems messages .SH SYNOPSIS .B syslogd [ .BI \-f configfile ] [ .BI \-m markinterval ] [ .B \-d ] .SH DESCRIPTION .I Syslogd reads and logs messages into a set of files described by the configuration file /etc/syslog.conf. Each message is one line. A message can contain a priority code, marked by a number in angle braces at the beginning of the line. Priorities are defined in .RI < sys/syslog.h >. .I Syslogd reads from the UNIX domain socket .IR /dev/log , from an Internet domain socket specified in .IR /etc/services , and from the special device .I /dev/klog (to read kernel messages). .PP .I Syslogd configures when it starts up and whenever it receives a hangup signal. Lines in the configuration file have a .I selector to determine the message priorities to which the line applies and an .IR action . The .I action field are separated from the selector by one or more tabs. .PP Selectors are semicolon separated lists of priority specifiers. Each priority has a .I facility describing the part of the system that generated the message, a dot, and a .I level indicating the severity of the message. Symbolic names may be used. An asterisk selects all facilities. All messages of the specified level or higher (greater severity) are selected. More than one facility may be selected using commas to separate them. For example: .PP .ti +5 *.emerg;mail,daemon.crit .PP Selects all facilities at the .I emerg level and the .I mail and .I daemon facilities at the .I crit level. .PP Known facilities and levels recognized by .I syslogd are those listed in .IR syslog (3) without the leading ``LOG_''. The additional facility ``mark'' has a message at priority LOG_INFO sent to it every 20 minutes (this may be changed with the .B \-m flag). The ``mark'' facility is not enabled by a facility field containing an asterisk. The level ``none'' may be used to disable a particular facility. For example, .PP .ti +5 *.debug;mail.none .PP Sends all messages .I except mail messages to the selected file. .PP The second part of each line describes where the message is to be logged if this line is selected. There are four forms: .IP \(bu 3n A filename (beginning with a leading slash). The file will be opened in append mode. .IP \(bu 3n A hostname preceeded by an at sign (``@''). Selected messages are forwarded to the .I syslogd on the named host. .IP \(bu 3n A comma separated list of users. Selected messages are written to those users if they are logged in. .IP \(bu 3n An asterisk. Selected messages are written to all logged-in users. .PP Blank lines and lines beginning with `#' are ignored. .PP For example, the configuration file: .PP .nf .ta 4m +\w'*.alert,auth.warning'u+3 kern,mark.debug /dev/console *.notice;mail.info /var/log/maillog *.crit /var/log/critical kern.err @ucbarpa *.emerg * *.alert eric,kridle *.alert;auth.warning ralph .fi .PP logs all kernel messages and 20 minute marks onto the system console, all notice (or higher) level messages and all mail system messages except debug messages into the file /var/log/maillog, and all critical messages into /var/log/critical; kernel messages of error severity or higher are forwarded to ucbarpa. All users will be informed of any emergency messages, the users ``eric'' and ``kridle'' will be informed of any alert messages, and the user ``ralph'' will be informed of any alert message, or any warning message (or higher) from the authorization system. .PP The flags are: .TP 0.5i .B \-f Specify an alternate configuration file. .TP .B \-m Select the number of minutes between mark messages. .TP .B \-d Turn on debugging. .PP .I Syslogd creates the file /var/run/syslog.pid, if possible, containing a single line with its process id. This can be used to kill or reconfigure .I syslogd. .PP To bring .I syslogd down, it should be sent a terminate signal (e.g. kill \`cat /var/run/syslog.pid\`). .SH FILES .ta \w'/etc/syslog.conf 'u .nf /etc/syslog.conf the configuration file /var/run/syslog.pid the process id /dev/log Name of the UNIX domain datagram log socket /dev/klog The kernel log device .fi .SH SEE ALSO logger(1), syslog(3)