Browse Prior Art Database

Log File Management

IP.com Disclosure Number: IPCOM000114968D
Original Publication Date: 1995-Feb-01
Included in the Prior Art Database: 2005-Mar-30
Document File: 2 page(s) / 69K

Publishing Venue

IBM

Related People

Birgen, GC: AUTHOR [+2]

Abstract

Disclosed is a design for a program that simplifies the monitoring and administration of log files. Operating systems, their subsystems, and applications create many log files that must be monitored and managed by a system administrator. In many cases, the existence of these log files and their locations are not readily apparent and management tools or administrative interfaces are not provided, leaving the system adminstrator to his own devises to discover and manage these logs. This design specifies a program that can greatly simplify the creation, discovery, and administration of log files.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 52% of the total text.

Log File Management

      Disclosed is a design for a program that simplifies the
monitoring and administration of log files.   Operating systems,
their subsystems, and applications create many log files that must be
monitored and managed by a system administrator.  In many cases, the
existence of these log files and their locations are not readily
apparent and management tools or administrative interfaces are not
provided, leaving the system adminstrator to his own devises to
discover and manage these logs.  This design specifies a program that
can greatly simplify the creation, discovery, and administration of
log files.

      The program includes capabilities for creating and appending to
log files, listing the contents of log files, and configuring the
location and size of log files.

      The program reads from standard input and writes the input to a
file while at the same time copying it to standard output.   The
program treats the file as a circular log, that is, when it reaches
the maximum size specified for it, it wraps, i.e., new entries are
written over the top of oldest entries.  The program keeps a header
record in the log file to keep track of it size and input and output
pointers.  The program provides command line parameters to modify its
behavior, e.g., the user can suppress the copying of the input to the
log file or to standard output.

      The provision for maintaining fixed size circular log files
frees the administrator from the task of managing the unbounded
growth and filesystem consumption typical of conventional log files.

      A log file's location and size are provided to the program as
command line parameters or in a configuration database.  A file
pathname and size or a log type can be specified.  If a l...