24.12.2012 Views

Chapter 4 - DSpace at Waseda University

Chapter 4 - DSpace at Waseda University

Chapter 4 - DSpace at Waseda University

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Chapter</strong> 3<br />

shows how useful the logged event logs are for a system developer.<br />

3.1.2 Event Log Monitoring<br />

Figure 3.1: flow chart of the event log<br />

Because of the importance of event logs as the source of system health inform<strong>at</strong>ion, many<br />

tools have been developed over the past 15-20 years for monitoring event logs in real-time.<br />

Sw<strong>at</strong>ch [Hansen and Atkins, 1993] was the first such tool and is still used by many sites.<br />

Sw<strong>at</strong>ch [47] monitors log files by reading every event message line th<strong>at</strong> is appended to the<br />

log file, and compares it with rules where the conditional part of each rule is a regular<br />

expression (rules are stored in a textual configur<strong>at</strong>ion file). If the regular expression of a<br />

certain rule m<strong>at</strong>ches the event message line, Sw<strong>at</strong>ch executes the action part of the rule.<br />

Actions include sending a mail, executing an external program, writing a notific<strong>at</strong>ion to the<br />

system console, etc. Sw<strong>at</strong>ch has also an option for ignoring repe<strong>at</strong>ed event messages for a<br />

given time interval.<br />

Another popular tool for event log monitoring is Logsurfer [Ley and Ellerman, 1996]. Like<br />

24

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!