Log Rotation Policy for the Appliance Logs
The appliance log files contain operating system messages. To simplify log data management, the appliance uses a log rotation policy that creates multiple files for each appliance log. You can define this policy.
The appliance creates one initial file for each appliance log. After this file reaches its specified size or time limit (daily, weekly, or monthly), the appliance adds the date to the filename, and then starts a new file for new log messages. For example, the syslog file is initially named messages and becomes messages-20120630 when it is rotated on June 30, 2012. After the rotation, the system creates a new file named messages for the most recent log messages.
You can compress log files to reduce the amount of storage space they require. For example, if you choose to compress rotated log files with bzip2, the rotated file from the previous example would be named messages-20120630.bz2.
Shredding overwrites deleted appliance log files to help prevent the recovery of confidential information. For example, you can specify that the system overwrite deleted files seven times. Higher numbers are more secure, but lower numbers require fewer system resources.
After the appliance creates the maximum number of log files, it deletes the oldest rotated log files before rotating the current file. For example, if the maximum number of files is five, and five rotated messages files have been created, the appliance deletes the oldest file and then rotates the current messages file.
Related Tasks
Related Articles
Videos 12Number of Views Log Files for Bulk Requests 12Number of Views View All Administrators Associated with an Administrative Role 8Number of Views Select an Integration Path for Authentication Manager and Cloud Access Service 68Number of Views Grant RSA Customer Support Access to Your Account 20Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle