From owner-freebsd-isp@FreeBSD.ORG Mon Jan 21 08:57:42 2008 Return-Path: Delivered-To: freebsd-isp@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id ACD7C16A41A for ; Mon, 21 Jan 2008 08:57:42 +0000 (UTC) (envelope-from support-return@acronis.com) Received: from support.acronis.com (support.acronis.com [91.195.23.45]) by mx1.freebsd.org (Postfix) with ESMTP id 2B9F813C46A for ; Mon, 21 Jan 2008 08:57:41 +0000 (UTC) (envelope-from support-return@acronis.com) Received: from support.acronis.com (support.acronis.com [127.0.0.1]) by support.acronis.com (8.13.7/8.13.7) with ESMTP id m0L8BVdm005421 for ; Mon, 21 Jan 2008 11:11:31 +0300 Received: (from apache@localhost) by support.acronis.com (8.13.7/8.13.7/Submit) id m0L8BVF8005420; Mon, 21 Jan 2008 11:11:31 +0300 Date: Mon, 21 Jan 2008 11:11:31 +0300 Message-Id: <200801210811.m0L8BVF8005420@support.acronis.com> X-Authentication-Warning: support.acronis.com: apache set sender to support-return@support.acronis.com using -f MIME-Version: 1.0 X-Mailer: MIME-tools 5.420 (Entity 5.420) Sender: support@acronis.com Content-Type: multipart/mixed; boundary="----------=_1200903091-15844-97" X-RT-Loop-Prevention: Acronis To: freebsd-isp@freebsd.org Content-Transfer-Encoding: binary From: support@acronis.com X-SpamTest-Version: SMTP-Filter Version 3.0.0 [0255], KAS30/Release X-SpamTest-Info: Not protected Subject: Re:Re: Approved file X-BeenThere: freebsd-isp@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Internet Services Providers List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 21 Jan 2008 08:57:42 -0000 This is a multi-part message in MIME format... ------------=_1200903091-15844-97 Content-Type: text/plain; charset="utf-8" Content-Disposition: inline Content-Transfer-Encoding: base64 VGhhbmsgeW91IGZvciBjb250YWN0aW5nIEFjcm9uaXMhCgpJbiBvcmRlciB0 byBpbXByb3ZlIHRoZSBzcGVlZCBhbmQgcXVhbGl0eSBvZiBjdXN0b21lciBz ZXJ2aWNlIEFjcm9uaXMgaW50cm9kdWNlZCBjaGFuZ2VzIGluIGl0cyBzdXBw b3J0IHByYWN0aWNlczogbmV3IHJlcXVlc3RzIHNob3VsZCBiZSBzdWJtaXR0 ZWQgdmlhIHdlYiBmb3JtLgoKVG8gc3VibWl0IGEgbmV3IHJlcXVlc3QsIHBs ZWFzZSBmb2xsb3cgb25lIG9mIHRoZSBsaW5rcyBnaXZlbiBiZWxvdy4KSWYg eW91IGFyZSBhbiBvd25lciBvZiBhbiBBY3JvbmlzIHByb2R1Y3QsIHBsZWFz ZSBjbGljayBoZXJlOgpodHRwOi8vd3d3LmFjcm9uaXMuY29tL2hvbWVjb21w dXRpbmcvY29tcGFueS9jb250YWN0cy9yZXF1ZXN0Lz90PTImZW1haWw9ZnJl ZWJzZC1pc3BAZnJlZWJzZC5vcmcKCklmIHlvdSBkbyBub3Qgb3duIGFueSBB Y3JvbmlzIHByb2R1Y3QsIHBsZWFzZSBjbGljayBoZXJlOgpodHRwOi8vd3d3 LmFjcm9uaXMuY29tL2hvbWVjb21wdXRpbmcvY29tcGFueS9jb250YWN0cy9y ZXF1ZXN0Lz90PTEmZW1haWw9ZnJlZWJzZC1pc3BAZnJlZWJzZC5vcmcKCgpJ ZiBjbGlja2luZyB0aGUgbGluayBkb2VzIG5vdCBvcGVuIHRoZSBicm93c2Vy LCB0aGVuIHBsZWFzZSBzZWxlY3Qgb25lIG9mIHRoZSBsaW5rcyBhYm92ZSwg Y29weSBpdCBhbmQgcGFzdGUgaW50byB5b3VyIGJyb3dzZXIgYWRkcmVzcyBs aW5lLgoKTm90ZSB0aGF0IHlvdSBuZWVkIHRvIHN1Ym1pdCB5b3VyIHJlcXVl c3QgdXNpbmcgdGhlIG9ubGluZSBmb3JtIG9ubHkgb25jZS4KQWxsIHRoZSBm dXJ0aGVyIHJlcGxpZXMgcmVnYXJkaW5nIHN1Ym1pdHRlZCByZXF1ZXN0IGNh biBiZSBzZW50IHRvIEFjcm9uaXMgYnkgZW1haWwuCgpXaGVuIHlvdSByZWNl aXZlIGEgbWFpbCBhbnN3ZXIgdG8geW91ciBmaWxlZCByZXF1ZXN0LCBwbGVh c2UgdXNlIHRoZSBBbnN3ZXIgb3IgUmVwbHkgYnV0dG9uIG9mIHlvdXIgbWFp bCBwcm9ncmFtIGZvciBzZW5kaW5nIGEgcmVwbHkgdG8gdXMuIFlvdSBkbyBu b3QgbmVlZCB0byBzdWJtaXQgeW91ciByZXBsaWVzIHZpYSB3ZWIgaW50ZXJm YWNlLgoKWW91IGNhbiBhbHNvIHF1aWNrbHkgZmluZCB0aGUgYW5zd2VycyB0 byB5b3VyIHF1ZXN0aW9ucyBpbiBBY3JvbmlzIFN1cHBvcnQKS25vd2xlZGdl IEJhc2UgYXQgaHR0cDovL3d3dy5hY3JvbmlzLmNvbS9ob21lY29tcHV0aW5n L3N1cHBvcnQva2IvLgoKCkJlc3QgcmVnYXJkcywKQWNyb25pcyBDdXN0b21l ciBTZXJ2aWNlCg== ------------=_1200903091-15844-97-- From owner-freebsd-isp@FreeBSD.ORG Tue Jan 22 08:30:57 2008 Return-Path: Delivered-To: freebsd-isp@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id AAC0316A417 for ; Tue, 22 Jan 2008 08:30:57 +0000 (UTC) (envelope-from williamromsay@gmail.com) Received: from rv-out-0910.google.com (rv-out-0910.google.com [209.85.198.187]) by mx1.freebsd.org (Postfix) with ESMTP id 2789513C46E for ; Tue, 22 Jan 2008 08:30:57 +0000 (UTC) (envelope-from williamromsay@gmail.com) Received: by rv-out-0910.google.com with SMTP id l15so2278869rvb.43 for ; Tue, 22 Jan 2008 00:30:57 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:to:subject:mime-version:content-type; bh=N8PzXTajEpVjVlQxU8kgAr9uWqXraMFJ1GZo9bOq074=; b=rQRKK0/LTGdp/Ww67AFyubRVpXC30GTah6pMS1RUKqUgu29LfIYJZdcyTFQJn7/+DGO3HBB7abwCfs19waOBQt3DKsu6lcED0c+3/guA3h+KalLdarSCt7rTiJyEVmsRWgOpeAmEOPo+bQ4YO1Cq8HuPmpcaK4m9T8xyVxFGgT4= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:to:subject:mime-version:content-type; b=kR4VC4IKoK6PA2HDugJ40tVhMTHzxRGz1Kw4keSoxV1xMLhusedoproWYDkll3RMhAGKt0/EcCKisTbCufL/tLn5Ua0OKBMBZDwbGjJkIrsUGkL8hKdNqsqyqTf2RVzbC7GvfmktqG474FLluZeK+ADuxb2Vw9C/oLxg4pVFYrg= Received: by 10.140.163.3 with SMTP id l3mr5175093rve.253.1200990656990; Tue, 22 Jan 2008 00:30:56 -0800 (PST) Received: by 10.140.170.11 with HTTP; Tue, 22 Jan 2008 00:30:56 -0800 (PST) Message-ID: <9e338f8f0801220030x3439cb44s8e71f41d811c8757@mail.gmail.com> Date: Tue, 22 Jan 2008 10:30:56 +0200 From: "william romsay" To: freebsd-isp@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Content-Disposition: inline X-Content-Filtered-By: Mailman/MimeDel 2.1.5 Subject: Hershey Felder, Grapevine Star Entertainment Inc. Announces Demented Dragon LLC to Add Music concerts to its Current Manga Marketing and Promotion Efforts X-BeenThere: freebsd-isp@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Internet Services Providers List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 22 Jan 2008 08:30:57 -0000 Hershey Felder, Grapevine Star Entertainment Inc. Announces Demented Dragon LLC to Add Music concerts to its Current Manga Marketing and Promotion Efforts Concerts to be featured at Anime and Comic festivals and in shopping malls across America. Grapevine Star Entertainment Inc., a licensing content and product development company, and Demented Dragon LLC, an Edmonton, Alberta, Canada-based Manga publisher, announced the launch of its marketing and promotion plan to support its Manga book titles and its promotion and licensing partners. From owner-freebsd-isp@FreeBSD.ORG Wed Jan 23 18:25:55 2008 Return-Path: Delivered-To: freebsd-isp@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 09DB816A417 for ; Wed, 23 Jan 2008 18:25:55 +0000 (UTC) (envelope-from andreas@klemm.apsfilter.org) Received: from srv1.cosmo-project.de (srv1.cosmo-project.de [213.83.6.106]) by mx1.freebsd.org (Postfix) with ESMTP id 7DA2A13C459 for ; Wed, 23 Jan 2008 18:25:54 +0000 (UTC) (envelope-from andreas@klemm.apsfilter.org) Received: from srv1.cosmo-project.de (localhost [IPv6:::1]) by srv1.cosmo-project.de (8.12.10/8.12.10) with ESMTP id m0NHF6Z4035177 (version=TLSv1/SSLv3 cipher=EDH-RSA-DES-CBC3-SHA bits=168 verify=NO) for ; Wed, 23 Jan 2008 18:15:06 +0100 (CET) (envelope-from andreas@klemm.apsfilter.org) Received: (from uucp@localhost) by srv1.cosmo-project.de (8.12.10/8.12.10/Submit) with UUCP id m0NHF6tp035176 for freebsd-isp@freebsd.org; Wed, 23 Jan 2008 18:15:06 +0100 (CET) (envelope-from andreas@klemm.apsfilter.org) Received: from titan.klemm.apsfilter.org (localhost.klemm.apsfilter.org [127.0.0.1]) by klemm.apsfilter.org (8.14.2/8.13.4) with ESMTP id m0NHBS1w019562 for ; Wed, 23 Jan 2008 18:11:28 +0100 (CET) (envelope-from andreas@titan.klemm.apsfilter.org) Received: (from andreas@localhost) by titan.klemm.apsfilter.org (8.14.2/8.13.8/Submit) id m0NHBSvU019339 for freebsd-isp@freebsd.org; Wed, 23 Jan 2008 18:11:28 +0100 (CET) (envelope-from andreas) Date: Wed, 23 Jan 2008 18:11:28 +0100 From: Andreas Klemm To: freebsd-isp@freebsd.org Message-ID: <20080123171128.GA2398@titan.klemm.apsfilter.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline X-Operating-System: FreeBSD 6.3-STABLE X-Disclaimer: A free society is one where it is safe to be unpopular User-Agent: Mutt/1.5.15 (2007-04-06) Subject: central logfile / real time logging X-BeenThere: freebsd-isp@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Internet Services Providers List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 23 Jan 2008 18:25:55 -0000 Hi, do you have an idea how to store application generated logfiles (i.e. apache, ... ) from 1000 Solaris "zones" running on 250 physical Sun server onto a central FreeBSD logserver ? There are 6 strong demands, which makes this setup very special and tricky. After many thinking and googeling I didn't find any OpenSource or at least "not too expensive" solution which fulfills all of these demands: - "reliability", no logmessage may get lost - on the central logserver the logfiles need to stay in separate files per virtual zone and application (can be the case the zone runs multiple services) - "real-time logging", as soon as an application logrecord gets written on one of the 1000 zones this logmessage should be written immediately onto the central logserver. So its not sufficient to make this batched on an hourly base. - applications may not write to NFS directly to prevent locking of apps if NFS server is unavailable (if solution should be NFS based). - this solution needs to be aware of logfile rotation on the application server side (the 1000 zones) - this logging needs to be done from the "global zone" of a Solaris server. Some people seem to use syslog-ng for this on client and central repository side. But I see here some problems. I need to convert apache logs from normal logfiles. This must happen from the Global Zones. Then the syslog-ng on the central side has no chance (I think) to demultiplex the logfile stream into logs separated by the different zone and application. On the Global Zones I need a process that tracks some logfiles that are from different virtual zones. I need to open one tcp session to central archive per logfile. So ~250 global zones open ~1000 tcp sessions towards the central FreeBSD server. There must be a way to tell the application on central FreeBSD Server, that this stream now should be written to a certain subdirectory and filename, so that all is separate. This application need to buffer on the Global zone, if the server is not available. Or at least keep track, what hasn't been written yet. And must be aware of logfile rotation. Any idea ? Andreas /// -- Andreas Klemm - Powered by FreeBSD 6 Need a magic printfilter today ? -> http://www.apsfilter.org/ From owner-freebsd-isp@FreeBSD.ORG Wed Jan 23 19:05:17 2008 Return-Path: Delivered-To: freebsd-isp@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 1C85B16A419; Wed, 23 Jan 2008 19:05:17 +0000 (UTC) (envelope-from tom@tomjudge.com) Received: from s200aog17.obsmtp.com (s200aog17.obsmtp.com [207.126.144.131]) by mx1.freebsd.org (Postfix) with SMTP id 5862613C4EE; Wed, 23 Jan 2008 19:05:15 +0000 (UTC) (envelope-from tom@tomjudge.com) Received: from source ([217.206.187.80]) by eu1sys200aob017.postini.com ([207.126.147.11]) with SMTP; Wed, 23 Jan 2008 19:05:14 UTC Received: from bill.mintel.co.uk (bill.mintel.co.uk [10.0.0.89]) by rodney.mintel.co.uk (Postfix) with ESMTP id E43D1181426; Wed, 23 Jan 2008 18:46:59 +0000 (GMT) Message-ID: <47978BA3.1020105@tomjudge.com> Date: Wed, 23 Jan 2008 18:46:59 +0000 From: Tom Judge User-Agent: Thunderbird 2.0.0.6 (X11/20071022) MIME-Version: 1.0 To: Andreas Klemm References: <20080123171128.GA2398@titan.klemm.apsfilter.org> In-Reply-To: <20080123171128.GA2398@titan.klemm.apsfilter.org> Content-Type: multipart/mixed; boundary="------------000405090706040901080408" Cc: freebsd-isp@freebsd.org Subject: Re: central logfile / real time logging X-BeenThere: freebsd-isp@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Internet Services Providers List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 23 Jan 2008 19:05:17 -0000 This is a multi-part message in MIME format. --------------000405090706040901080408 Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Andreas Klemm wrote: > Hi, > > do you have an idea how to store application generated logfiles > (i.e. apache, ... ) from 1000 Solaris "zones" running on 250 > physical Sun server onto a central FreeBSD logserver ? > > There are 6 strong demands, which makes this setup very special > and tricky. > > After many thinking and googeling I didn't find any OpenSource or > at least "not too expensive" solution which fulfills all of these > demands: > > - "reliability", no logmessage may get lost > - on the central logserver the logfiles need to stay in separate files > per virtual zone and application (can be the case the zone runs > multiple services) > - "real-time logging", as soon as an application logrecord gets written > on one of the 1000 zones this logmessage should be written immediately > onto the central logserver. So its not sufficient to make this batched > on an hourly base. > - applications may not write to NFS directly to prevent locking of apps > if NFS server is unavailable (if solution should be NFS based). > - this solution needs to be aware of logfile rotation > on the application server side (the 1000 zones) > - this logging needs to be done from the "global zone" of a Solaris server. > I think you are heading in the right direction here. Syslog-ng should be able to do all of this for you. The premium edition will give you disk based buffering on you global zone relay's if you have money to spend that is.... To stop message loss you can use TCP as the transport. You should be able to configure syslog-ng to listen on a different port for every file you want to transport. It will also be able to do automagic rotation of the files on the centeral server for you such as {sourcehost}/{year}/{month}/{day}.log etc.... There are some tools that you can use with apache for example which will allow apache to log directly to syslog so that you don't have to worry about the source files. Or you could get syslog-ng to setup a collection of named pipes that your processes write their logs to etc etc, there are a huge number of solutions. I have attached an example config that we use to collect logs from our switches and other hosts, it may interest you. Some docs that may help: http://www.balabit.com/dl/html/syslog-ng-admin-guide_en.html/index.html or PDF version: http://www.balabit.com/dl/guides/syslog-ng-v2.0-guide-admin-en.pdf http://www.campin.net/syslog-ng/faq.html Good luck Tom > Some people seem to use syslog-ng for this on client and central > repository side. > > But I see here some problems. I need to convert apache logs from > normal logfiles. This must happen from the Global Zones. > > Then the syslog-ng on the central side has no chance (I think) > to demultiplex the logfile stream into logs separated by > the different zone and application. > > On the Global Zones I need a process that tracks some logfiles > that are from different virtual zones. > > I need to open one tcp session to central archive per logfile. > > So ~250 global zones open ~1000 tcp sessions towards the central > FreeBSD server. > > There must be a way to tell the application on central FreeBSD > Server, that this stream now should be written to a certain > subdirectory and filename, so that all is separate. > > This application need to buffer on the Global zone, if the server > is not available. Or at least keep track, what hasn't been written > yet. And must be aware of logfile rotation. > > Any idea ? > > Andreas /// > --------------000405090706040901080408 Content-Type: text/plain; name="syslog-ng.conf" Content-Transfer-Encoding: 7bit Content-Disposition: inline; filename="syslog-ng.conf" # # This sample configuration file is essentially equilivent to the stock # FreeBSD /etc/syslog.conf file. # # # options # options { long_hostnames(off); sync(0); create_dirs(yes);}; # # sources # source src { unix-dgram("/var/run/log"); unix-dgram("/var/run/logpriv" perm(0600)); internal(); file("/dev/klog"); }; source switchs { udp(port(9999)); }; source r_hosts { udp(port(9998)); }; source r_workstations { udp(port(514)); }; # # destinations # destination messages { file("/var/log/messages"); }; destination security { file("/var/log/security"); }; destination authlog { file("/var/log/auth.log"); }; destination maillog { file("/var/log/maillog"); }; destination lpd-errs { file("/var/log/lpd-errs"); }; destination xferlog { file("/var/log/xferlog"); }; destination cron { file("/var/log/cron"); }; destination debuglog { file("/var/log/debug.log"); }; destination consolelog { file("/var/log/console.log"); }; destination all { file("/var/log/all.log"); }; destination newscrit { file("/var/log/news/news.crit"); }; destination newserr { file("/var/log/news/news.err"); }; destination newsnotice { file("/var/log/news/news.notice"); }; destination slip { file("/var/log/slip.log"); }; destination ppp { file("/var/log/ppp.log"); }; destination console { file("/dev/console"); }; destination allusers { usertty("*"); }; destination cvsupd { file("/var/log/cvsupd.log"); }; destination d_switchs { file("/var/log/switchs/$HOST"); }; destination d_workstations { file("/var/log/workstations/$HOST"); }; destination r_messages { file("/var/log/remote/$HOST/$YEAR/$MONTH/$DAY/messages"); }; destination r_security { file("/var/log/remote/$HOST/$YEAR/$MONTH/$DAY/security"); }; destination r_authlog { file("/var/log/remote/$HOST/$YEAR/$MONTH/$DAY/auth.log"); }; destination r_maillog { file("/var/log/remote/$HOST/$YEAR/$MONTH/$DAY/maillog"); }; destination r_lpd-errs { file("/var/log/remote/$HOST/$YEAR/$MONTH/$DAY/lpd-errs"); }; destination r_xferlog { file("/var/log/remote/$HOST/$YEAR/$MONTH/$DAY/xferlog"); }; destination r_cron { file("/var/log/remote/$HOST/$YEAR/$MONTH/$DAY/cron"); }; destination r_debuglog { file("/var/log/remote/$HOST/$YEAR/$MONTH/$DAY/debug.log"); }; destination r_consolelog { file("/var/log/remote/$HOST/$YEAR/$MONTH/$DAY/console.log"); }; destination r_all { file("/var/log/remote/$HOST/$YEAR/$MONTH/$DAY/all.log"); }; destination r_newscrit { file("/var/log/remote/$HOST/$YEAR/$MONTH/$DAY/news/news.crit"); }; destination r_newserr { file("/var/log/remote/$HOST/$YEAR/$MONTH/$DAY/news/news.err"); }; destination r_newsnotice { file("/var/log/remote/$HOST/$YEAR/$MONTH/$DAY/news/news.notice"); }; destination r_slip { file("/var/log/remote/$HOST/$YEAR/$MONTH/$DAY/slip.log"); }; destination r_ppp { file("/var/log/remote/$HOST/$YEAR/$MONTH/$DAY/ppp.log"); }; destination r_console { file("/dev/console"); }; destination r_allusers { usertty("*"); }; #destination loghost { udp("loghost" port(514)); }; # # log facility filters # filter f_auth { facility(auth); }; filter f_authpriv { facility(authpriv); }; filter f_not_authpriv { not facility(authpriv); }; filter f_console { facility(console); }; filter f_cron { facility(cron); }; filter f_daemon { facility(daemon); }; filter f_ftp { facility(ftp); }; filter f_kern { facility(kern); }; filter f_lpr { facility(lpr); }; filter f_mail { facility(mail); }; filter f_news { facility(news); }; filter f_security { facility(security); }; filter f_user { facility(user); }; filter f_uucp { facility(uucp); }; filter f_local0 { facility(local0); }; filter f_local1 { facility(local1); }; filter f_local2 { facility(local2); }; filter f_local3 { facility(local3); }; filter f_local4 { facility(local4); }; filter f_local5 { facility(local5); }; filter f_local6 { facility(local6); }; filter f_local7 { facility(local7); }; # # log level filters # filter f_emerg { level(emerg); }; filter f_alert { level(alert..emerg); }; filter f_crit { level(crit..emerg); }; filter f_err { level(err..emerg); }; filter f_warning { level(warning..emerg); }; filter f_notice { level(notice..emerg); }; filter f_info { level(info..emerg); }; filter f_debug { level(debug..emerg); }; filter f_is_debug { level(debug); }; # # program filters # filter f_ppp { program("ppp"); }; filter f_slip { program("startslip"); }; filter f_cvsup { program("cvsupd"); }; # # *.err;kern.warning;auth.notice;mail.crit /dev/console # log { source(src); filter(f_err); destination(console); }; log { source(src); filter(f_kern); filter(f_warning); destination(console); }; log { source(src); filter(f_auth); filter(f_notice); destination(console); }; log { source(src); filter(f_mail); filter(f_crit); destination(console); }; # # *.notice;authpriv.none;kern.debug;lpr.info;mail.crit;news.err /var/log/messages # log { source(src); filter(f_notice); filter(f_not_authpriv); destination(messages); }; log { source(src); filter(f_kern); filter(f_debug); destination(messages); }; log { source(src); filter(f_lpr); filter(f_info); destination(messages); }; log { source(src); filter(f_mail); filter(f_crit); destination(messages); }; log { source(src); filter(f_news); filter(f_err); destination(messages); }; # # security.* /var/log/security # log { source(src); filter(f_security); destination(security); }; # # auth.info;authpriv.info /var/log/auth.log log { source(src); filter(f_auth); filter(f_info); destination(authlog); }; log { source(src); filter(f_authpriv); filter(f_info); destination(authlog); }; # # mail.info /var/log/maillog # log { source(src); filter(f_mail); filter(f_info); destination(maillog); }; # # lpr.info /var/log/lpd-errs # log { source(src); filter(f_lpr); filter(f_info); destination(lpd-errs); }; # # ftp.info /var/log/xferlog # log { source(src); filter(f_ftp); filter(f_info); destination(xferlog); }; # # cron.* /var/log/cron # log { source(src); filter(f_cron); destination(cron); }; # # *.=debug /var/log/debug.log # log { source(src); filter(f_is_debug); destination(debuglog); }; # # *.emerg * # log { source(src); filter(f_emerg); destination(allusers); }; log { source(src); filter(f_cvsup); filter(f_daemon); filter(f_info); destination (cvsupd); }; # # uncomment this to log all writes to /dev/console to /var/log/console.log # console.info /var/log/console.log # #log { source(src); filter(f_console); filter(f_info); destination(consolelog); }; # # uncomment this to enable logging of all log messages to /var/log/all.log # touch /var/log/all.log and chmod it to mode 600 before it will work # *.* /var/log/all.log # #log { source(src); destination(all); }; # # uncomment this to enable logging to a remote loghost named loghost # *.* @loghost # #log { source(src); destination(loghost); }; # # uncomment these if you're running inn # news.crit /var/log/news/news.crit # news.err /var/log/news/news.err # news.notice /var/log/news/news.notice # #log { source(src); filter(f_news); filter(f_crit); destination(newscrit); }; #log { source(src); filter(f_news); filter(f_err); destination(newserr); }; #log { source(src); filter(f_news); filter(f_notice); destination(newsnotice); }; # # !startslip # *.* /var/log/slip.log # log { source(src); filter(f_slip); destination(slip); }; # # !ppp # *.* /var/log/ppp.log # log { source(src); filter(f_ppp); destination(ppp); }; log { source(switchs); destination(d_switchs); }; log { source(r_workstations); destination(d_workstations); }; ########################################################################################################## # # REMOTE STUFF # # # *.err;kern.warning;auth.notice;mail.crit /dev/console # log { source(r_hosts); filter(f_err); destination(r_console); }; log { source(r_hosts); filter(f_kern); filter(f_warning); destination(r_console); }; log { source(r_hosts); filter(f_auth); filter(f_notice); destination(r_console); }; log { source(r_hosts); filter(f_mail); filter(f_crit); destination(r_console); }; # # *.notice;authpriv.none;kern.debug;lpr.info;mail.crit;news.err /var/log/messages # log { source(r_hosts); filter(f_notice); filter(f_not_authpriv); destination(r_messages); }; log { source(r_hosts); filter(f_kern); filter(f_debug); destination(r_messages); }; log { source(r_hosts); filter(f_lpr); filter(f_info); destination(r_messages); }; log { source(r_hosts); filter(f_mail); filter(f_crit); destination(r_messages); }; log { source(r_hosts); filter(f_news); filter(f_err); destination(r_messages); }; # # security.* /var/log/security # log { source(r_hosts); filter(f_security); destination(r_security); }; # # auth.info;authpriv.info /var/log/auth.log log { source(r_hosts); filter(f_auth); filter(f_info); destination(r_authlog); }; log { source(r_hosts); filter(f_authpriv); filter(f_info); destination(r_authlog); }; # # mail.info /var/log/maillog # log { source(r_hosts); filter(f_mail); filter(f_info); destination(r_maillog); }; # # lpr.info /var/log/lpd-errs # log { source(r_hosts); filter(f_lpr); filter(f_info); destination(r_lpd-errs); }; # # ftp.info /var/log/xferlog # log { source(r_hosts); filter(f_ftp); filter(f_info); destination(r_xferlog); }; # # cron.* /var/log/cron # log { source(r_hosts); filter(f_cron); destination(r_cron); }; # # *.=debug /var/log/debug.log # log { source(r_hosts); filter(f_is_debug); destination(r_debuglog); }; # # *.emerg * # log { source(r_hosts); filter(f_emerg); destination(r_allusers); }; # uncomment this to log all writes to /dev/console to /var/log/console.log # console.info /var/log/console.log # #log { source(src); filter(f_console); filter(f_info); destination(consolelog); }; # # uncomment this to enable logging of all log messages to /var/log/all.log # touch /var/log/all.log and chmod it to mode 600 before it will work # *.* /var/log/all.log # #log { source(src); destination(all); }; # # uncomment this to enable logging to a remote loghost named loghost # *.* @loghost # #log { source(src); destination(loghost); }; # # uncomment these if you're running inn # news.crit /var/log/news/news.crit # news.err /var/log/news/news.err # news.notice /var/log/news/news.notice # #log { source(src); filter(f_news); filter(f_crit); destination(newscrit); }; #log { source(src); filter(f_news); filter(f_err); destination(newserr); }; #log { source(src); filter(f_news); filter(f_notice); destination(newsnotice); }; # # !startslip # *.* /var/log/slip.log # log { source(r_hosts); filter(f_slip); destination(r_slip); }; # # !ppp # *.* /var/log/ppp.log # log { source(r_hosts); filter(f_ppp); destination(r_ppp); }; --------------000405090706040901080408-- From owner-freebsd-isp@FreeBSD.ORG Wed Jan 23 19:07:51 2008 Return-Path: Delivered-To: freebsd-isp@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id B66E016A468 for ; Wed, 23 Jan 2008 19:07:51 +0000 (UTC) (envelope-from howie@thingy.com) Received: from mail.thingy.com (wotsit.thingy.com [212.21.100.67]) by mx1.freebsd.org (Postfix) with ESMTP id 27ECB13C45D for ; Wed, 23 Jan 2008 19:07:50 +0000 (UTC) (envelope-from howie@thingy.com) Received: (qmail 89051 invoked by uid 0); 23 Jan 2008 18:41:08 +0000 Received: from unknown (HELO ?192.168.1.56?) (howie@thingy.com@212.21.124.49) by wotsit3.thingy.com with AES256-SHA encrypted SMTP; 23 Jan 2008 18:41:08 +0000 Message-ID: <47978A47.2040402@thingy.com> Date: Wed, 23 Jan 2008 18:41:11 +0000 From: Howard Jones User-Agent: Thunderbird 2.0.0.9 (Windows/20071031) MIME-Version: 1.0 To: Andreas Klemm References: <20080123171128.GA2398@titan.klemm.apsfilter.org> In-Reply-To: <20080123171128.GA2398@titan.klemm.apsfilter.org> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Cc: freebsd-isp@freebsd.org Subject: Re: [freebsd-isp] central logfile / real time logging X-BeenThere: freebsd-isp@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Internet Services Providers List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 23 Jan 2008 19:07:51 -0000 Andreas Klemm wrote: > Hi, > > do you have an idea how to store application generated logfiles > (i.e. apache, ... ) from 1000 Solaris "zones" running on 250 > physical Sun server onto a central FreeBSD logserver ? > Take a look at mod_log_spread? [0] This uses multicast to avoid many tcp connections, and also to allow for resilient logging (multiple receivers). Not certain about the reliability aspect, but the Spread site[1] mentions "a range of reliability, ordering and stability guarantees for messages". I have never used this myself, of course ;-) Howie [0] http://www.backhand.org/mod_log_spread/ [1] http://www.spread.org/index.html From owner-freebsd-isp@FreeBSD.ORG Wed Jan 23 21:27:09 2008 Return-Path: Delivered-To: freebsd-isp@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 4369316A417 for ; Wed, 23 Jan 2008 21:27:09 +0000 (UTC) (envelope-from hamlu8na@yahoo.com.ar) Received: from smtp-01.arnet.com.ar (smtp-01.arnet.com.ar [200.45.191.24]) by mx1.freebsd.org (Postfix) with SMTP id CC83513C46E for ; Wed, 23 Jan 2008 21:27:08 +0000 (UTC) (envelope-from hamlu8na@yahoo.com.ar) Received: (qmail 23744 invoked from network); 23 Jan 2008 20:58:28 -0000 Received: from unknown (HELO pIII1g) (190.30.83.106) by 0 with SMTP; 23 Jan 2008 20:58:27 -0000 Message-ID: <022b01c85e0b$57729f40$1500a8c0@pIII1g> From: "Walter" To: Date: Wed, 23 Jan 2008 19:00:18 -0300 MIME-Version: 1.0 Content-Type: text/plain; format=flowed; charset="iso-8859-1"; reply-type=original Content-Transfer-Encoding: 7bit X-Priority: 3 X-MSMail-Priority: Normal X-Mailer: Microsoft Outlook Express 6.00.2900.3138 X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.3198 Subject: Postfix tls sasl2 how X-BeenThere: freebsd-isp@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Internet Services Providers List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 23 Jan 2008 21:27:09 -0000 Hi : I am new to the list and have a query. I installed freebsd 6.3 and have changed sendmail to postfix compiled from the ports with support tls and sasl2 can not activate these functions. Does anyone know how to do it or knows of a howto on this?. Thanks to all. Greetings Walter.- From owner-freebsd-isp@FreeBSD.ORG Wed Jan 23 23:01:45 2008 Return-Path: Delivered-To: freebsd-isp@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id BE3DA16A41A for ; Wed, 23 Jan 2008 23:01:45 +0000 (UTC) (envelope-from 000.fbsd@quip.cz) Received: from elsa.codelab.cz (elsa.codelab.cz [82.208.36.70]) by mx1.freebsd.org (Postfix) with ESMTP id 8835F13C468 for ; Wed, 23 Jan 2008 23:01:45 +0000 (UTC) (envelope-from 000.fbsd@quip.cz) Received: from localhost (localhost.codelab.cz [127.0.0.1]) by elsa.codelab.cz (Postfix) with ESMTP id BB52E19E023; Wed, 23 Jan 2008 23:43:11 +0100 (CET) Received: from [192.168.1.2] (r3a200.net.upc.cz [213.220.192.200]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by elsa.codelab.cz (Postfix) with ESMTP id 6BCCE19E019; Wed, 23 Jan 2008 23:43:02 +0100 (CET) Message-ID: <4797C300.3070208@quip.cz> Date: Wed, 23 Jan 2008 23:43:12 +0100 From: Miroslav Lachman <000.fbsd@quip.cz> User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.7.12) Gecko/20050915 X-Accept-Language: cz, cs, en, en-us MIME-Version: 1.0 To: Walter References: <022b01c85e0b$57729f40$1500a8c0@pIII1g> In-Reply-To: <022b01c85e0b$57729f40$1500a8c0@pIII1g> Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Cc: freebsd-isp@freebsd.org Subject: Re: Postfix tls sasl2 how X-BeenThere: freebsd-isp@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Internet Services Providers List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 23 Jan 2008 23:01:45 -0000 Walter wrote: > Hi : > I am new to the list and have a query. I installed freebsd > 6.3 and have changed sendmail to postfix compiled from the ports with > support tls and sasl2 can not activate these functions. Does anyone know > how to do it or knows of a howto on this?. > Thanks to all. > Greetings > Walter.- There are many variations of HowTo for this topic on the internet. One of them is http://postfix.state-of-mind.de/patrick.koetter/smtpauth/ It is not FreeBSD specific. Miroslav Lachman From owner-freebsd-isp@FreeBSD.ORG Fri Jan 25 13:54:16 2008 Return-Path: Delivered-To: freebsd-isp@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id CD4DB16A468 for ; Fri, 25 Jan 2008 13:54:16 +0000 (UTC) (envelope-from williamromsay@gmail.com) Received: from rv-out-0910.google.com (rv-out-0910.google.com [209.85.198.184]) by mx1.freebsd.org (Postfix) with ESMTP id 6F4D813C43E for ; Fri, 25 Jan 2008 13:54:15 +0000 (UTC) (envelope-from williamromsay@gmail.com) Received: by rv-out-0910.google.com with SMTP id l15so628964rvb.43 for ; Fri, 25 Jan 2008 05:54:15 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:received:received:message-id:date:from:to:subject:mime-version:content-type; bh=ILoPR5K8pI3YYvI820fXeGxS8YxkR1bEAmaZyIjJAqw=; b=O9EtmpTlKCHErFW1SRLuhBlZKuj4opnMa+OF7nhcDcqYcfISl7HJHR1n0MkIiUwbg2sx392ldttJqcm9OU1dFI3c8l21Vb9Y1ok4jSdmEnBZo23XxXLnauu6Syuy5eURZXyX0z19I5dYeNBqsd5wXYWUI8Ph3kdww9zL4JB6xl0= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=message-id:date:from:to:subject:mime-version:content-type; b=ZNJOAfe3vQG76tjikao+R68aQVW6pbdg/eCDaZkowvrW/Yzk0DS07R+GUplhB3NWhEuCXBhsDJipM2H1P+y2ExfX0PfQVYa0SrFMDHLeouQrrEdfC9WHNZSkfC2WABYvDKSuhXdjmQymJeXYvp8jFoCFwaYaAASJnaOl7+2hdKc= Received: by 10.141.171.6 with SMTP id y6mr1433645rvo.174.1201269255204; Fri, 25 Jan 2008 05:54:15 -0800 (PST) Received: by 10.140.170.11 with HTTP; Fri, 25 Jan 2008 05:54:15 -0800 (PST) Message-ID: <9e338f8f0801250554x7fc5cdd1va070c2b4aed643e7@mail.gmail.com> Date: Fri, 25 Jan 2008 15:54:15 +0200 From: "william romsay" To: freebsd-isp@freebsd.org MIME-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Content-Disposition: inline X-Content-Filtered-By: Mailman/MimeDel 2.1.5 Subject: Peak IT, A Tourist Guide To The Italian Lakes X-BeenThere: freebsd-isp@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Internet Services Providers List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 25 Jan 2008 13:54:16 -0000 Peak IT, A Tourist Guide To The Italian Lakes The classic holiday would be a beach resort or skiing package. However, for those looking for something a bit different, why not try the Lake District in Northern Italy. The lakes of Como, Maggiore and Garda are renowned for their outstanding natural beauty and incredible scenery. There are plenty of historic towns scattered along the shores of the lakes. All are characteristic of the area with shuttered ochre houses, cobble streets and small churches. Travelling There The three airports that are nearby and offer transfers are Milan Bergamo, Brescia and Verona. You can also get there with ease by rail and bus so travelling there should be a simple choice. Accommodation There are many forms of accommodation in the area from hotels to bed and breakfasts, which is the most common option. When choosing a hotel, be sure to not take any notice of the star ratings as most of the on and two star hotels are of excellent quality. However, if you are after class there are certain luxury hotels that offer the highest qualities. History of the Area Italian history is vast and heavily linked with the Roman Empire as is the Lake District area that remained with the Empire until its collapse. The Italian Renaissance that occurred during the 14th and 15th centuries involved the redevelopment of historic Italian Features. This was seen in the arts and architecture of the Lake District area. The city of Milan has a great influence on the lakes due to its close proximity. Sights and Attractions The main features of the area are obviously the magnificent lakes, especially those of Como, Maggiore and Garda. There are various excursions on each of the lakes that are worth a look such as the steam cruise on Lake Como and visits to the stunning gardens on shores of the lakes. If you like historic towns and villages then take a drive through the mountains as they are riddled with beautiful little towns. Shopping in the Area There are plenty of little shops that are unique to the area. Weekly outdoor markets are popular and have plenty of nice items to look through including jewellery, leather and ceramics. Paintings are also a common purchase from these markets as there are some great galleries to browse. Dining The towns in the Lake District have plenty of dining options that suit all tastes. The most common eating establishments are the restaurants an pizzerias however be sure to check the price on the menus before entering to assure they are within your budget. Dan Oldfield is an employee at car rentals and has completed a tourist guide to the Italian Lakes.