/etc/rsyslog.conf is the configuration file using to manage the log file to write in the /var/log/*.log respective log files. [student@workstation ~]$ cat /etc/rsyslog.conf | grep -v “#” global(workDirectory=”/var/lib/rsyslog”) module(load=”builtin:omfile” Template=”RSYSLOG_TraditionalFileFormat”) include(file=”/etc/rsyslog.d/*.conf” mode=”optional”) *.info;mail.none;authpriv.none;cron.none /var/log/messages authpriv.* /var/log/secure mail.* -/var/log/maillog cron.* /var/log/cron Read More …
Basic File Permissions
Understanding file permissions is key to running a web server. Permissions control which users can read a file, make changes to a file, or execute a file/script/etc. File permissions on a Linux server are always listed in a series Read More …
How do I set up Setuid, Setgid, and Sticky Bits on Linux
What Are Linux File Permissions? Setuid, Setgid and Sticky Bits are special types of Unix/Linux file permission sets that permit certain users to run specific programs with elevated privileges. Ultimately the permissions that are set on a file determine what Read More …
What is Umask and How to Use it
Umask, or the user file-creation mode, is a Linux command that is used to assign the default file permission sets for newly created folders and files. The term mask references the grouping of the permission bits, each of which defines how its corresponding permission is Read More …
What are Inodes in Linux
As you are probably already aware, everything is considered to be a file in Linux. That includes hardware devices, processes, directories, regular files, sockets, links, and so on. Generally, the file system is divided into data blocks and inodes. With that Read More …
Linux Commands Cheat Sheet
In this page, you will find Basic Linux Commands. As you all knows, Linux is widely using in many areas now a days. Generally System Administrators and Linux end users will use this commands a lot in their day to Read More …
In Linux, how to setup the MTU for network interface
MTU (Maximum Transmission Unit) is related to TCP/IP networking in Linux/BSD/UNIX. It refers to the size (in bytes) of the largest datagram that a given layer of a communications protocol can pass at a time. You can see current Read More …
Linux Interview Questions
Q:1 Why LVM is required ? Ans: LVM stands for Logical Volume Manager , to resize file system’s size online we required LVM partition in Linux. Size of LVM partition can be extended and reduced using the lvextend & lvreduce Read More …
How to Execute Linux Commands on Remote System over SSH
Overview Many times we need to work with remote Linux systems. We login to the remote host, perform work and exit that session. Can we perform all these actions from local machine ? Yes, it’s possible and this tutorial demonstrates Read More …
How to Reset Forgotten Root Password in Redhat 8/CentOS 8
Reset Forgotten root Password in CentOS 8 First, reboot or power on your Redhat 8/CentOS 8 system. Select the kernel you want to boot into. Next, press ‘e’ on the keyboard to interrupt the boot process and make changes. Redhat 8/CentOS Read More …