We highly recommend collecting log files of all nodes in a central place, often called the log host. With the standard Unix system logging mechanism, this is very possible, because logging information can be sent over the network. Doing that has the advantage of allowing review and parsing of log files in a central place, either manually or using one of the already-mentioned log analysis tools. Because you can correlate logs from different machines, this can give you deeper insight into your network's health and activities.
In deploying a centralized logging facility, you must secure it carefully. Establishing a centralized log collection makes it much more difficult for attackers to wipe their tracks because they will need to attack one more host successfully in order to manipulate the collected log messages.
Was this article helpful?
Read how to maintain and repair any desktop and laptop computer. This Ebook has articles with photos and videos that show detailed step by step pc repair and maintenance procedures. There are many links to online videos that explain how you can build, maintain, speed up, clean, and repair your computer yourself. Put the money that you were going to pay the PC Tech in your own pocket.