search
HomeOperation and MaintenanceLinux Operation and MaintenanceHow do I configure log rotation in Linux using logrotate?

This article explains Linux log rotation using logrotate. It details configuration via /etc/logrotate.d/, covering options like rotation frequency, file retention, compression, and troubleshooting. The main focus is effective log file management t

How do I configure log rotation in Linux using logrotate?

How to Configure Log Rotation in Linux Using Logrotate

Logrotate is a powerful tool in Linux for managing log file sizes and automating their rotation. It prevents log files from growing indefinitely, consuming disk space and potentially impacting system performance. The primary configuration file is /etc/logrotate.conf, which contains global settings, and individual log file configurations are typically placed in /etc/logrotate.d/. You can create a new configuration file within /etc/logrotate.d/ for each log file or group of log files you want to manage. Let's create a simple configuration file for a hypothetical log file /var/log/my_app.log:

<code>/var/log/my_app.log {
    daily
    rotate 7
    compress
    copytruncate
    missingok
    notifempty
}</code>

This configuration tells logrotate to:

  • daily: Rotate the log file daily.
  • rotate 7: Keep 7 rotated log files. Older files will be removed.
  • compress: Compress rotated log files using gzip.
  • copytruncate: Creates a new, empty log file after rotation. This ensures that the application continues logging without interruption. This is preferred over simply rotating the file.
  • missingok: Ignore the log file if it doesn't exist. This prevents errors if the application isn't running.
  • notifempty: Don't rotate the log file if it's empty. This prevents unnecessary rotations when the application isn't generating logs.

To apply this configuration, run logrotate -d /etc/logrotate.d/my_app.log (the -d flag runs in dry-run/testing mode) to see what changes logrotate would make, and then run logrotate /etc/logrotate.d/my_app.log to actually perform the rotation. You can also run logrotate without any arguments to process all configurations in /etc/logrotate.d/ and /etc/logrotate.conf. Remember to adjust the configuration options to fit your specific needs and log file size requirements.

What Are the Common Logrotate Configuration Options and Their Uses?

Besides the options used in the example above, logrotate offers several other valuable options:

  • weekly, monthly, yearly: Specify the rotation frequency (instead of daily).
  • rotate count: Specifies the number of rotated log files to keep.
  • size size: Rotate the log file when it reaches a certain size (e.g., size 100M).
  • dateext: Append a date to the rotated log file names (e.g., my_app.log.20241027).
  • postrotate command: Execute a command after log rotation (useful for restarting services that use the log files).
  • prerotate command: Execute a command before log rotation.
  • sharedscripts: Use the same postrotate/prerotate scripts for multiple log files.
  • delaycompress: Delay compression until the next rotation. This can improve performance if compression is time-consuming.
  • create mode owner group: Create a new log file with specified permissions and ownership after rotation.

These options provide flexibility in managing log rotation schedules, file retention, and post-rotation actions, allowing for tailored configurations to suit various applications and system requirements. Refer to the man logrotate page for a comprehensive list of all available options and their detailed descriptions.

How Can I Troubleshoot Logrotate Issues If My Logs Aren't Rotating Correctly?

If log rotation isn't working as expected, several troubleshooting steps can help identify the problem:

  1. Check the logrotate log file: Logrotate logs its actions to /var/log/logrotate.log (or a location specified by the log directive in /etc/logrotate.conf). Examine this log file for error messages or clues about why rotation failed.
  2. Verify the configuration file: Carefully review your logrotate configuration file for syntax errors or incorrect settings. A simple typo can prevent logrotate from working correctly. Use the -d (dry-run) option with logrotate to test your configuration without actually performing rotations.
  3. Check file permissions: Ensure that the logrotate process has the necessary permissions to read, write, and rotate the log files.
  4. Examine the log file's ownership and permissions: Make sure the log file is owned by a user or group that the logrotate process can access.
  5. Ensure logrotate is running: Check if the logrotate service is running and enabled. This usually involves checking the status of the service (e.g., systemctl status logrotate on systemd systems) and ensuring it's enabled to start automatically on boot.
  6. Test with a simple configuration: Create a simple test configuration file to rule out problems with complex configurations.
  7. Check for errors in the application logging: Problems within the application generating the log files can also prevent logrotate from functioning properly.

By systematically investigating these aspects, you can pinpoint the cause of the log rotation issues and implement the necessary corrections.

Can I Use Logrotate to Compress Rotated Log Files?

Yes, logrotate can compress rotated log files using the compress option in its configuration file. As shown in the first example, adding compress to your configuration will automatically compress the rotated log files using gzip. The compressed files will typically have a .gz extension. This helps reduce disk space usage, especially for applications generating large log files. Note that compression adds some overhead to the rotation process, so if performance is critical, you might consider using delaycompress to defer compression until the next rotation.

The above is the detailed content of How do I configure log rotation in Linux using logrotate?. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Linux: A Deep Dive into Its Fundamental PartsLinux: A Deep Dive into Its Fundamental PartsApr 21, 2025 am 12:03 AM

The core components of Linux include kernel, file system, shell, user and kernel space, device drivers, and performance optimization and best practices. 1) The kernel is the core of the system, managing hardware, memory and processes. 2) The file system organizes data and supports multiple types such as ext4, Btrfs and XFS. 3) Shell is the command center for users to interact with the system and supports scripting. 4) Separate user space from kernel space to ensure system stability. 5) The device driver connects the hardware to the operating system. 6) Performance optimization includes tuning system configuration and following best practices.

Linux Architecture: Unveiling the 5 Basic ComponentsLinux Architecture: Unveiling the 5 Basic ComponentsApr 20, 2025 am 12:04 AM

The five basic components of the Linux system are: 1. Kernel, 2. System library, 3. System utilities, 4. Graphical user interface, 5. Applications. The kernel manages hardware resources, the system library provides precompiled functions, system utilities are used for system management, the GUI provides visual interaction, and applications use these components to implement functions.

Linux Operations: Utilizing the Maintenance ModeLinux Operations: Utilizing the Maintenance ModeApr 19, 2025 am 12:08 AM

Linux maintenance mode can be entered through the GRUB menu. The specific steps are: 1) Select the kernel in the GRUB menu and press 'e' to edit, 2) Add 'single' or '1' at the end of the 'linux' line, 3) Press Ctrl X to start. Maintenance mode provides a secure environment for tasks such as system repair, password reset and system upgrade.

Linux: How to Enter Recovery Mode (and Maintenance)Linux: How to Enter Recovery Mode (and Maintenance)Apr 18, 2025 am 12:05 AM

The steps to enter Linux recovery mode are: 1. Restart the system and press the specific key to enter the GRUB menu; 2. Select the option with (recoverymode); 3. Select the operation in the recovery mode menu, such as fsck or root. Recovery mode allows you to start the system in single-user mode, perform file system checks and repairs, edit configuration files, and other operations to help solve system problems.

Linux's Essential Components: Explained for BeginnersLinux's Essential Components: Explained for BeginnersApr 17, 2025 am 12:08 AM

The core components of Linux include the kernel, file system, shell and common tools. 1. The kernel manages hardware resources and provides basic services. 2. The file system organizes and stores data. 3. Shell is the interface for users to interact with the system. 4. Common tools help complete daily tasks.

Linux: A Look at Its Fundamental StructureLinux: A Look at Its Fundamental StructureApr 16, 2025 am 12:01 AM

The basic structure of Linux includes the kernel, file system, and shell. 1) Kernel management hardware resources and use uname-r to view the version. 2) The EXT4 file system supports large files and logs and is created using mkfs.ext4. 3) Shell provides command line interaction such as Bash, and lists files using ls-l.

Linux Operations: System Administration and MaintenanceLinux Operations: System Administration and MaintenanceApr 15, 2025 am 12:10 AM

The key steps in Linux system management and maintenance include: 1) Master the basic knowledge, such as file system structure and user management; 2) Carry out system monitoring and resource management, use top, htop and other tools; 3) Use system logs to troubleshoot, use journalctl and other tools; 4) Write automated scripts and task scheduling, use cron tools; 5) implement security management and protection, configure firewalls through iptables; 6) Carry out performance optimization and best practices, adjust kernel parameters and develop good habits.

Understanding Linux's Maintenance Mode: The EssentialsUnderstanding Linux's Maintenance Mode: The EssentialsApr 14, 2025 am 12:04 AM

Linux maintenance mode is entered by adding init=/bin/bash or single parameters at startup. 1. Enter maintenance mode: Edit the GRUB menu and add startup parameters. 2. Remount the file system to read and write mode: mount-oremount,rw/. 3. Repair the file system: Use the fsck command, such as fsck/dev/sda1. 4. Back up the data and operate with caution to avoid data loss.

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

MinGW - Minimalist GNU for Windows

MinGW - Minimalist GNU for Windows

This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

SublimeText3 English version

SublimeText3 English version

Recommended: Win version, supports code prompts!

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

VSCode Windows 64-bit Download

VSCode Windows 64-bit Download

A free and powerful IDE editor launched by Microsoft

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software