Sitemap

Member-only story

8 Log Files Every Linux Admin Should Monitor Daily

2 min readApr 24, 2025

--

Intro:

You can’t protect what you don’t monitor. Linux logs hold the answers to failed logins, strange commands, broken services, and suspicious activity — but only if you know where to look. These 8 log files are the first places I check during audits and daily health checks on both Ubuntu and Red Hat servers.

1. /var/log/auth.log (Ubuntu) / /var/log/secure (Red Hat)

Tracks login attempts, sudo usage, and brute-force attacks.

🔍 Look for:

  • Failed password
  • Invalid user
  • sudo: entries for privilege escalation

2. /var/log/syslog (Ubuntu) / /var/log/messages (Red Hat)

The system-wide event log.

🧠 Why it matters:
If something weird is happening — kernel panic, service failure, hardware issues — it often shows up here first.

3. /var/log/cron

Shows scheduled jobs run via cron.

🔍 Watch for:

  • Unexpected or unknown jobs
  • Errors in job output
  • Signs of malware persistence using…

--

--

Faruk Ahmed
Faruk Ahmed

Written by Faruk Ahmed

With 10+ years as an InfoSec Analyst, I excel in Symantec DLP, CrowdStrike, QRadar, Qualys, FireEye, Red Hat Linux, WebLogic, Python, and Bash. I am Passionate.

No responses yet