


This article explains Linux log rotation using logrotate. It details configuration via /etc/logrotate.d/, covering options like rotation frequency, file retention, compression, and troubleshooting. The main focus is effective log file management t
How to Configure Log Rotation in Linux Using Logrotate
Logrotate is a powerful tool in Linux for managing log file sizes and automating their rotation. It prevents log files from growing indefinitely, consuming disk space and potentially impacting system performance. The primary configuration file is /etc/logrotate.conf
, which contains global settings, and individual log file configurations are typically placed in /etc/logrotate.d/
. You can create a new configuration file within /etc/logrotate.d/
for each log file or group of log files you want to manage. Let's create a simple configuration file for a hypothetical log file /var/log/my_app.log
:
<code>/var/log/my_app.log { daily rotate 7 compress copytruncate missingok notifempty }</code>
This configuration tells logrotate to:
- daily: Rotate the log file daily.
- rotate 7: Keep 7 rotated log files. Older files will be removed.
- compress: Compress rotated log files using gzip.
- copytruncate: Creates a new, empty log file after rotation. This ensures that the application continues logging without interruption. This is preferred over simply rotating the file.
- missingok: Ignore the log file if it doesn't exist. This prevents errors if the application isn't running.
- notifempty: Don't rotate the log file if it's empty. This prevents unnecessary rotations when the application isn't generating logs.
To apply this configuration, run logrotate -d /etc/logrotate.d/my_app.log
(the -d
flag runs in dry-run/testing mode) to see what changes logrotate would make, and then run logrotate /etc/logrotate.d/my_app.log
to actually perform the rotation. You can also run logrotate
without any arguments to process all configurations in /etc/logrotate.d/
and /etc/logrotate.conf
. Remember to adjust the configuration options to fit your specific needs and log file size requirements.
What Are the Common Logrotate Configuration Options and Their Uses?
Besides the options used in the example above, logrotate offers several other valuable options:
-
weekly, monthly, yearly: Specify the rotation frequency (instead of
daily
). - rotate count: Specifies the number of rotated log files to keep.
-
size size: Rotate the log file when it reaches a certain size (e.g.,
size 100M
). -
dateext: Append a date to the rotated log file names (e.g.,
my_app.log.20241027
). - postrotate command: Execute a command after log rotation (useful for restarting services that use the log files).
- prerotate command: Execute a command before log rotation.
- sharedscripts: Use the same postrotate/prerotate scripts for multiple log files.
- delaycompress: Delay compression until the next rotation. This can improve performance if compression is time-consuming.
- create mode owner group: Create a new log file with specified permissions and ownership after rotation.
These options provide flexibility in managing log rotation schedules, file retention, and post-rotation actions, allowing for tailored configurations to suit various applications and system requirements. Refer to the man logrotate
page for a comprehensive list of all available options and their detailed descriptions.
How Can I Troubleshoot Logrotate Issues If My Logs Aren't Rotating Correctly?
If log rotation isn't working as expected, several troubleshooting steps can help identify the problem:
-
Check the logrotate log file: Logrotate logs its actions to
/var/log/logrotate.log
(or a location specified by thelog
directive in/etc/logrotate.conf
). Examine this log file for error messages or clues about why rotation failed. -
Verify the configuration file: Carefully review your logrotate configuration file for syntax errors or incorrect settings. A simple typo can prevent logrotate from working correctly. Use the
-d
(dry-run) option withlogrotate
to test your configuration without actually performing rotations. - Check file permissions: Ensure that the logrotate process has the necessary permissions to read, write, and rotate the log files.
- Examine the log file's ownership and permissions: Make sure the log file is owned by a user or group that the logrotate process can access.
-
Ensure logrotate is running: Check if the logrotate service is running and enabled. This usually involves checking the status of the service (e.g.,
systemctl status logrotate
on systemd systems) and ensuring it's enabled to start automatically on boot. - Test with a simple configuration: Create a simple test configuration file to rule out problems with complex configurations.
- Check for errors in the application logging: Problems within the application generating the log files can also prevent logrotate from functioning properly.
By systematically investigating these aspects, you can pinpoint the cause of the log rotation issues and implement the necessary corrections.
Can I Use Logrotate to Compress Rotated Log Files?
Yes, logrotate can compress rotated log files using the compress
option in its configuration file. As shown in the first example, adding compress
to your configuration will automatically compress the rotated log files using gzip. The compressed files will typically have a .gz
extension. This helps reduce disk space usage, especially for applications generating large log files. Note that compression adds some overhead to the rotation process, so if performance is critical, you might consider using delaycompress
to defer compression until the next rotation.
The above is the detailed content of How do I configure log rotation in Linux using logrotate?. For more information, please follow other related articles on the PHP Chinese website!

The core components of Linux include kernel, file system, shell, user and kernel space, device drivers, and performance optimization and best practices. 1) The kernel is the core of the system, managing hardware, memory and processes. 2) The file system organizes data and supports multiple types such as ext4, Btrfs and XFS. 3) Shell is the command center for users to interact with the system and supports scripting. 4) Separate user space from kernel space to ensure system stability. 5) The device driver connects the hardware to the operating system. 6) Performance optimization includes tuning system configuration and following best practices.

The five basic components of the Linux system are: 1. Kernel, 2. System library, 3. System utilities, 4. Graphical user interface, 5. Applications. The kernel manages hardware resources, the system library provides precompiled functions, system utilities are used for system management, the GUI provides visual interaction, and applications use these components to implement functions.

Linux maintenance mode can be entered through the GRUB menu. The specific steps are: 1) Select the kernel in the GRUB menu and press 'e' to edit, 2) Add 'single' or '1' at the end of the 'linux' line, 3) Press Ctrl X to start. Maintenance mode provides a secure environment for tasks such as system repair, password reset and system upgrade.

The steps to enter Linux recovery mode are: 1. Restart the system and press the specific key to enter the GRUB menu; 2. Select the option with (recoverymode); 3. Select the operation in the recovery mode menu, such as fsck or root. Recovery mode allows you to start the system in single-user mode, perform file system checks and repairs, edit configuration files, and other operations to help solve system problems.

The core components of Linux include the kernel, file system, shell and common tools. 1. The kernel manages hardware resources and provides basic services. 2. The file system organizes and stores data. 3. Shell is the interface for users to interact with the system. 4. Common tools help complete daily tasks.

The basic structure of Linux includes the kernel, file system, and shell. 1) Kernel management hardware resources and use uname-r to view the version. 2) The EXT4 file system supports large files and logs and is created using mkfs.ext4. 3) Shell provides command line interaction such as Bash, and lists files using ls-l.

The key steps in Linux system management and maintenance include: 1) Master the basic knowledge, such as file system structure and user management; 2) Carry out system monitoring and resource management, use top, htop and other tools; 3) Use system logs to troubleshoot, use journalctl and other tools; 4) Write automated scripts and task scheduling, use cron tools; 5) implement security management and protection, configure firewalls through iptables; 6) Carry out performance optimization and best practices, adjust kernel parameters and develop good habits.

Linux maintenance mode is entered by adding init=/bin/bash or single parameters at startup. 1. Enter maintenance mode: Edit the GRUB menu and add startup parameters. 2. Remount the file system to read and write mode: mount-oremount,rw/. 3. Repair the file system: Use the fsck command, such as fsck/dev/sda1. 4. Back up the data and operate with caution to avoid data loss.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

SublimeText3 English version
Recommended: Win version, supports code prompts!

SublimeText3 Chinese version
Chinese version, very easy to use

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software