Tagged articles
7 articles
Page 1 of 1
Raymond Ops
Raymond Ops
Jun 22, 2025 · Operations

Master rsyslog & OpenSSH: Step‑by‑Step Server Logging and Secure Access

This guide walks you through configuring rsyslog for centralized log collection, distinguishing syslog and klog processes, and setting up OpenSSH with host keys and password‑less RSA authentication, including practical command examples and essential rsyslog and SSH options.

OpenSSHrsyslogssh key authentication
0 likes · 14 min read
Master rsyslog & OpenSSH: Step‑by‑Step Server Logging and Secure Access
MaGe Linux Operations
MaGe Linux Operations
Nov 10, 2024 · Operations

How to Set Up rsyslog and SSH Key Authentication on CentOS 8

This guide walks through checking system information, configuring rsyslog on a CentOS 8 client‑server pair, managing syslog/klogd processes, disabling firewalld, and establishing password‑less SSH access using RSA key pairs, while also summarizing useful scp options.

Sysadminkey authenticationrsyslog
0 likes · 15 min read
How to Set Up rsyslog and SSH Key Authentication on CentOS 8
Liangxu Linux
Liangxu Linux
Oct 8, 2024 · Fundamentals

How to Implement Lightweight System Logging on Resource‑Constrained MCUs

This article explains a compact method for recording system logs on embedded devices with limited storage, detailing flash memory partitioning, data structures, parameter handling, and a set of AT‑style commands for querying, writing, and managing logs in external flash.

Microcontrollerflash memorysystem logging
0 likes · 24 min read
How to Implement Lightweight System Logging on Resource‑Constrained MCUs
Liangxu Linux
Liangxu Linux
Nov 6, 2022 · Operations

Extend Your SSD Life: Install and Use Log2Ram on Linux

This guide explains why continuous Linux logging wears out SSDs, how Log2Ram redirects logs to RAM, and provides step‑by‑step commands to install, configure, and verify Log2Ram, helping you prolong disk lifespan while maintaining system diagnostics.

LinuxLog2RamSSD
0 likes · 6 min read
Extend Your SSD Life: Install and Use Log2Ram on Linux
Efficient Ops
Efficient Ops
Nov 19, 2020 · Information Security

How to Efficiently Audit Linux System Operations: Tools, Tips, and Filtering Rules

This article explains why detailed system operation logs are essential for security audits and troubleshooting, outlines practical filtering guidelines, and compares five Linux auditing methods—history, custom bash, snoopy, auditd, and eBPF—highlighting their strengths, limitations, and usage examples.

AuditdLinux auditingeBPF
0 likes · 13 min read
How to Efficiently Audit Linux System Operations: Tools, Tips, and Filtering Rules
Liangxu Linux
Liangxu Linux
Dec 9, 2019 · Operations

Mastering dmesg: View, Filter, and Control Linux Kernel Logs

This tutorial explains how the Linux kernel uses a circular buffer for log messages and shows how to use the dmesg command to display, format, filter, paginate, follow, and clear those logs, including permission handling and useful command‑line options.

command-linedmesgsystem logging
0 likes · 8 min read
Mastering dmesg: View, Filter, and Control Linux Kernel Logs