Chapter 4 - DSpace at Waseda University
Chapter 4 - DSpace at Waseda University
Chapter 4 - DSpace at Waseda University
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
<strong>Chapter</strong> 3<br />
shows how useful the logged event logs are for a system developer.<br />
3.1.2 Event Log Monitoring<br />
Figure 3.1: flow chart of the event log<br />
Because of the importance of event logs as the source of system health inform<strong>at</strong>ion, many<br />
tools have been developed over the past 15-20 years for monitoring event logs in real-time.<br />
Sw<strong>at</strong>ch [Hansen and Atkins, 1993] was the first such tool and is still used by many sites.<br />
Sw<strong>at</strong>ch [47] monitors log files by reading every event message line th<strong>at</strong> is appended to the<br />
log file, and compares it with rules where the conditional part of each rule is a regular<br />
expression (rules are stored in a textual configur<strong>at</strong>ion file). If the regular expression of a<br />
certain rule m<strong>at</strong>ches the event message line, Sw<strong>at</strong>ch executes the action part of the rule.<br />
Actions include sending a mail, executing an external program, writing a notific<strong>at</strong>ion to the<br />
system console, etc. Sw<strong>at</strong>ch has also an option for ignoring repe<strong>at</strong>ed event messages for a<br />
given time interval.<br />
Another popular tool for event log monitoring is Logsurfer [Ley and Ellerman, 1996]. Like<br />
24