System information

2.8 Files and File Systems ........................................................................ 40
2.9 User Information ................................................................................ 43
2.10 Time and Date ................................................................................. 43
2.11 Graph Your Data: RRDtool ............................................................... 44
3 Monitoring with Nagios 51
3.1 Features of Nagios ............................................................................. 51
3.2 Installing Nagios ................................................................................. 51
3.3 Nagios Configuration Files .................................................................. 52
3.4 Configuring Nagios ............................................................................ 55
3.5 Troubleshooting ................................................................................. 58
3.6 For More Information ......................................................................... 59
4 Analyzing and Managing System Log Files 61
4.1 System Log Files in /var/log/ ........................................................ 61
4.2 Viewing and Parsing Log Files ............................................................. 64
4.3 Managing Log Files with logrotate ................................................. 64
4.4 Monitoring Log Files with logwatch ................................................. 66
4.5 Using logger to Make System Log Entries .......................................... 67
III Kernel Monitoring 69
5 SystemTap—Filtering and Analyzing System Data
71
5.1 Conceptual Overview .......................................................................... 71
5.2 Installation and Setup .......................................................................... 74
5.3 Script Syntax ..................................................................................... 76
5.4 Example Script .................................................................................. 83
5.5 User-Space Probing ............................................................................ 84
5.6 For More Information ......................................................................... 85