Skip to content

OpenLDAP Quick Tips: OpenLDAP Logfile analysis

OpenLDAPOpen SourceSuretec Hi All,

Here's the 14th tip in the "OpenLDAP Quick Tips" series and today it comes from "Pablo Chamorro":

"You want to analyse your OpenLDAP logfile":

There are various ways to do this yourself by hand, but the have community already done the work for you and written the:

OpenLDAP Logfile analysis utility:

ldap[?] is a Perl program that can be used to analyze and report on OpenLDAP logfiles. The available reports include: operations (e.g., Connect, Bind, Unbind) performed per host, unindexed searches, attributes requested, search filters used, total operations per server, and operation breakdowns by day, hour and month.

A short sample output would look like:

[root@suretec ~]# ./ldap[?] /var/log/openldap.log  Report Generated on Mon Dec  1 14:57:43 2008 -------------------------------------------- Processed "/var/log/openldap.log":  Apr  5 00:01:50 - Dec  1 08:39:33 Operation totals ---------------- Total operations              : 19258 Total connections             : 7061 Total authentication failures : 2358 Total binds                   : 4403 Total unbinds                 : 6661 Total searches                : 7849 Total compares                : 0 Total modifications           : 215 Total modrdns                 : 0 Total additions               : 128 Total deletions               : 2 Unindexed attribute requests  : 0 Operations per connection     : 2.73 ..... ..... .....

A longer sample is available.



If you have an entry for our "OpenLDAP Quick Tips" series, why not e-mail your tip to us.

P.S. For direct access to this section, you can click OpenLDAP Quick Tips.


No Trackbacks


Display comments as Linear | Threaded

bronius on :

*These tips are a good resource. Have you got a suggestion on how to audit OpenLDAP for changes: who modified what at what times..

If there is a tool available, great, if not, it would be a good tip to demonstrate some easy log-parsing.

Gavin Henry on :

*See the latest post at your request ;-)

Add Comment

Enclosing asterisks marks text as bold (*word*), underscore are made via _word_.
Standard emoticons like :-) and ;-) are converted to images.
BBCode format allowed

To prevent automated Bots from commentspamming, please enter the string you see in the image below in the appropriate input box. Your comment will only be submitted if the strings match. Please ensure that your browser supports and accepts cookies, or your comment cannot be verified correctly.

Pavatar, Gravatar, Favatar, MyBlogLog, Pavatar author images supported.
Form options