Back in the day I was a UNIX Systems admin. One of the “joys” of being a sysadmin was chugging through log files. I looked for errors in applications. I looked for commands that people used to delete their entire account (rm –r ./*.* is a good one). I looked for the reason why particular databases brought down the operating system. One of the essentials in any sysadmin’s toolbox is tail <>. Looking at these nicely formatted, but rarely structured enough to be placed in a database table (log4j is a good example), log files was a daily occurrence with an active environment.
All Information Management articles are archived after 7 days. REGISTER NOW for unlimited access to all recently archived articles, as well as thousands of searchable stories. Registered Members also gain access to:
- Full access to information-management.com including all searchable archived content
- Exclusive E-Newsletters delivering the latest headlines to your inbox
- Access to White Papers, Web Seminars, and Blog Discussions
- Discounts to upcoming conferences & events
- Uninterrupted access to all sponsored content, and MORE!