19ef5d758f
if given this). this is extremely useful for chrooted daemons that still want to create log entries via a local mechanism. - create a new -P option that takes a filename of log sockets (equiv. of calling syslogd which -p <each line of file>. this is useful for the case of many chroot areas and keeping this information in one place rather than having to remember it all. if no -p options are given, the default (_PATH_LOG) is used as normal.
159 lines
4.8 KiB
Groff
159 lines
4.8 KiB
Groff
.\" Copyright (c) 1983, 1986, 1991, 1993
|
|
.\" The Regents of the University of California. All rights reserved.
|
|
.\"
|
|
.\" Redistribution and use in source and binary forms, with or without
|
|
.\" modification, are permitted provided that the following conditions
|
|
.\" are met:
|
|
.\" 1. Redistributions of source code must retain the above copyright
|
|
.\" notice, this list of conditions and the following disclaimer.
|
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
|
.\" notice, this list of conditions and the following disclaimer in the
|
|
.\" documentation and/or other materials provided with the distribution.
|
|
.\" 3. All advertising materials mentioning features or use of this software
|
|
.\" must display the following acknowledgment:
|
|
.\" This product includes software developed by the University of
|
|
.\" California, Berkeley and its contributors.
|
|
.\" 4. Neither the name of the University nor the names of its contributors
|
|
.\" may be used to endorse or promote products derived from this software
|
|
.\" without specific prior written permission.
|
|
.\"
|
|
.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
.\" SUCH DAMAGE.
|
|
.\"
|
|
.\" from: @(#)syslogd.8 8.1 (Berkeley) 6/6/93
|
|
.\" $NetBSD: syslogd.8,v 1.9 1999/02/21 13:30:15 mrg Exp $
|
|
.\"
|
|
.Dd February 18, 1999
|
|
.Dt SYSLOGD 8
|
|
.Os BSD 4.2
|
|
.Sh NAME
|
|
.Nm syslogd
|
|
.Nd log systems messages
|
|
.Sh SYNOPSIS
|
|
.Nm
|
|
.Op Fl d
|
|
.Op Fl s
|
|
.Op Fl f Ar config_file
|
|
.Op Fl m Ar mark_interval
|
|
.Op Fl P Ar file_list
|
|
.Op Fl p Ar log_socket
|
|
.Op Fl p Ar log_socket2 ...
|
|
.Sh DESCRIPTION
|
|
.Nm
|
|
reads and logs messages to the system console, log files, other
|
|
machines and/or users as specified by its configuration file.
|
|
The options are as follows:
|
|
.Bl -tag -width Ds
|
|
.It Fl d
|
|
Enable debugging to the standard output,
|
|
and do not disassociate from the controlling terminal.
|
|
.It Fl f
|
|
Specify the pathname of an alternative configuration file;
|
|
the default is
|
|
.Pa /etc/syslog.conf .
|
|
.It Fl m
|
|
Select the number of minutes between ``mark'' messages;
|
|
the default is 20 minutes.
|
|
.It Fl s
|
|
Select ``secure'' mode, in which syslogd does not open a UDP socket but
|
|
only communicates over a
|
|
.Ux
|
|
domain socket.
|
|
This is valuable when the machine on
|
|
which syslogd runs is subject to attack over the network and it is desired
|
|
that the machine be protected from attempts to remotely fill logs
|
|
and similar attacks.
|
|
.It Fl p
|
|
Specify the pathname of an log socket. Multiple
|
|
.Fl p
|
|
options create multiple log sockets. If no -p arguments are created,
|
|
the default socket of
|
|
.Pa /dev/log
|
|
is used.
|
|
.It Fl P
|
|
Specify the pathname of a file containing a list of sockets to be
|
|
created. The format of the file is simply one socket per line.
|
|
.El
|
|
.Pp
|
|
.Nm
|
|
reads its configuration file when it starts up and whenever it
|
|
receives a hangup signal.
|
|
For information on the format of the configuration file,
|
|
see
|
|
.Xr syslog.conf 5 .
|
|
.Pp
|
|
.Nm
|
|
reads messages from the
|
|
.Ux
|
|
domain socket
|
|
.Pa /dev/log ,
|
|
from an Internet domain socket specified in
|
|
.Pa /etc/services ,
|
|
and from the special device
|
|
.Pa /dev/klog
|
|
(to read kernel messages).
|
|
.Pp
|
|
.Nm
|
|
creates the file
|
|
.Pa /var/run/syslog.pid ,
|
|
and stores its process
|
|
id there.
|
|
This can be used to kill or reconfigure
|
|
.Nm "" .
|
|
.Pp
|
|
By using multiple
|
|
.Fl p
|
|
options, one can setup many chroot environments by passing the pathname
|
|
to the log socket
|
|
.Pa ( /dev/log )
|
|
in each chroot area to syslogd. For example:
|
|
.Dl syslogd -p /dev/log -p /web/dev/log -p /ftp/dev/log
|
|
.Pp
|
|
note: the normal log socket must now also be passed to syslogd.
|
|
.Sh SYSLOG PROTOCOL NOTES
|
|
.Pp
|
|
The message sent to
|
|
.Nm
|
|
should consist of a single line.
|
|
The message can contain a priority code, which should be a preceding
|
|
decimal number in angle braces, for example,
|
|
.Sq Aq 5.
|
|
This priority code should map into the priorities defined in the
|
|
include file
|
|
.Aq Pa sys/syslog.h .
|
|
.Sh FILES
|
|
.Bl -tag -width /var/run/syslog.pid -compact
|
|
.It Pa /etc/syslog.conf
|
|
The configuration file.
|
|
.It Pa /var/run/syslog.pid
|
|
The process id of current
|
|
.Nm "" .
|
|
.It Pa /dev/log
|
|
Name of the
|
|
.Ux
|
|
domain datagram log socket.
|
|
.It Pa /dev/klog
|
|
The kernel log device.
|
|
.El
|
|
.Sh SEE ALSO
|
|
.Xr logger 1 ,
|
|
.Xr syslog 3 ,
|
|
.Xr services 5 ,
|
|
.Xr syslog.conf 5
|
|
.Sh HISTORY
|
|
The
|
|
.Nm
|
|
command appeared in
|
|
.Bx 4.3 .
|
|
Support for multiple log sockets appeared in
|
|
.Nx 1.4 .
|