{"id":3392,"date":"2023-05-25T14:31:19","date_gmt":"2023-05-25T11:31:19","guid":{"rendered":"https:\/\/www.virtono.com\/community\/?p=3392"},"modified":"2023-05-22T14:35:25","modified_gmt":"2023-05-22T11:35:25","slug":"locations-of-common-log-files-on-linux","status":"publish","type":"post","link":"https:\/\/www.virtono.com\/community\/knowledgebase\/locations-of-common-log-files-on-linux\/","title":{"rendered":"Locations of Common Log Files on Linux"},"content":{"rendered":"\n<p>In this tutorial, we will take you on a journey through the labyrinth of directories and unveil the secret locations of common log files on Linux. Whether you&#8217;re a beginner or an experienced user, this guide will equip you with the knowledge to easily access and analyze these crucial logs. As a Linux user or system administrator, you know the importance of log files on linux in troubleshooting and monitoring your system&#8217;s health. These files contain a wealth of information about various processes, errors, and events that occur on your Linux system.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"330\" data-attachment-id=\"3396\" data-permalink=\"https:\/\/www.virtono.com\/community\/knowledgebase\/locations-of-common-log-files-on-linux\/attachment\/linux-log-files\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/05\/linux-log-files.png?fit=600%2C330&amp;ssl=1\" data-orig-size=\"600,330\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"linux-log-files\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/05\/linux-log-files.png?fit=600%2C330&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/05\/linux-log-files.png?resize=600%2C330&#038;ssl=1\" alt=\"Locations of Common Log Files on Linux\" class=\"wp-image-3396\" srcset=\"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/05\/linux-log-files.png?w=600&amp;ssl=1 600w, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/05\/linux-log-files.png?resize=300%2C165&amp;ssl=1 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_73 counter-hierarchy ez-toc-counter ez-toc-light-blue ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.virtono.com\/community\/knowledgebase\/locations-of-common-log-files-on-linux\/#The_varlog_Directory\" title=\"The \/var\/log Directory\">The \/var\/log Directory<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.virtono.com\/community\/knowledgebase\/locations-of-common-log-files-on-linux\/#Application-Specific_Log_Files\" title=\"Application-Specific Log Files\">Application-Specific Log Files<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.virtono.com\/community\/knowledgebase\/locations-of-common-log-files-on-linux\/#Log_Files_for_System_Services\" title=\"Log Files for System Services\">Log Files for System Services<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.virtono.com\/community\/knowledgebase\/locations-of-common-log-files-on-linux\/#Custom_Log_Files_and_Configuration\" title=\"Custom Log Files and Configuration\">Custom Log Files and Configuration<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.virtono.com\/community\/knowledgebase\/locations-of-common-log-files-on-linux\/#Final_Thoughts\" title=\"Final Thoughts\">Final Thoughts<\/a><\/li><\/ul><\/nav><\/div>\n<h3 class=\"wp-block-heading has-accent-color has-text-color\"><span class=\"ez-toc-section\" id=\"The_varlog_Directory\"><\/span>The \/var\/log Directory<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>The \/var\/log directory is a goldmine of log files on Linux systems. It houses a plethora of log files related to system processes, applications, and services. Let&#8217;s explore some of the essential log files you&#8217;ll often encounter:<\/p>\n\n\n\n<p>a. <strong>\/var\/log\/syslog<\/strong>: This log file contains general system information, including kernel messages, device events, and software crashes. It&#8217;s a valuable resource for diagnosing system-level issues.<\/p>\n\n\n\n<p>b. <strong>\/var\/log\/auth.log<\/strong>: Here, you&#8217;ll find authentication-related logs, such as login attempts, successful logins, and authentication failures. Monitoring this file can help you detect unauthorized access attempts.<\/p>\n\n\n\n<p>c. <strong>\/var\/log\/messages<\/strong>: Similar to syslog, messages collect system messages but provide a more comprehensive view. It can aid in troubleshooting and detecting anomalies across different components of your Linux system.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-accent-color has-text-color\"><span class=\"ez-toc-section\" id=\"Application-Specific_Log_Files\"><\/span>Application-Specific Log Files<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Many applications on Linux maintain their own log files, typically located within the \/var\/log directory or their respective subdirectories. Let&#8217;s explore a few common examples:<\/p>\n\n\n\n<p>a. <strong>\/var\/log\/apache2\/access.log<\/strong> and <strong>\/var\/log\/apache2\/error.log<\/strong>: Apache HTTP Server maintains separate log files on linux for tracking access logs and error messages. They are invaluable in debugging web server-related issues.<\/p>\n\n\n\n<p>b. <strong>\/var\/log\/mysql\/error.log<\/strong>: MySQL <a href=\"https:\/\/www.virtono.com\/cloud-hosting\">database server<\/a> records errors and warnings in this log file. Examining it can help identify database-related problems and optimize performance.<\/p>\n\n\n\n<p>c. <strong>\/var\/log\/maillog<\/strong> or <strong>\/var\/log\/mail.log<\/strong>: Mail servers like Postfix or Sendmail store email-related logs here. These logs can help diagnose email delivery issues and monitor server activity.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-accent-color has-text-color\"><span class=\"ez-toc-section\" id=\"Log_Files_for_System_Services\"><\/span>Log Files for System Services<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Linux systems run various services, each with its own set of log files. Here are a few examples:<\/p>\n\n\n\n<p>a. <strong>\/var\/log\/cron<\/strong>: Cron is a time-based job scheduler on Linux. Its log file, cron, provides information about scheduled tasks, their execution, and potential errors.<\/p>\n\n\n\n<p>b. <strong>\/var\/log\/sshd.log<\/strong>: This log file records SSH (Secure Shell) daemon activities, including successful and failed login attempts. It helps you monitor SSH access and detect any suspicious activity.<\/p>\n\n\n\n<p>c. <strong>\/var\/log\/httpd\/access_log<\/strong> and <strong>\/var\/log\/httpd\/error_log<\/strong>: These log files on linux belong to the Apache HTTP Server. They contain information about incoming requests, errors, and performance metrics.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-accent-color has-text-color\"><span class=\"ez-toc-section\" id=\"Custom_Log_Files_and_Configuration\"><\/span>Custom Log Files and Configuration<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Apart from the standard log files on linux, you might encounter custom log files created by applications or system administrators. These log files can reside in various directories based on user preferences or application requirements. Additionally, system administrators can configure log file locations in the application&#8217;s configuration files.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-accent-color has-text-color\"><span class=\"ez-toc-section\" id=\"Final_Thoughts\"><\/span>Final Thoughts<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Log files are invaluable assets for Linux users and system administrators, providing insights into system health, identifying issues, and enabling effective troubleshooting. Understanding the locations of common log files discussed in this guide equips you with the necessary knowledge to navigate through the maze of directories and make the most of these logs.<\/p>\n\n\n\n<p>Remember, log analysis is not a one-time task; regularly monitoring log files can help you proactively identify and resolve potential issues, ensuring the smooth operation of your Linux system.<\/p>\n\n\n\n<p>By mastering the art of log file location and analysis, you take a significant step toward becoming a proficient Linux user or system administrator. Happy log hunting!<\/p>\n\n\n\n<p>In this tutorial, we&#8217;ve explored the essential log files on Linux systems, including the \/var\/log directory, application-specific log files, log files for system services, and custom log files. Understanding their locations will empower you to troubleshoot issues and maintain a robust Linux environment. Remember to regularly monitor these log files to proactively identify and resolve potential problems. With this knowledge, you&#8217;re well on your way to becoming a skilled Linux user or system administrator. Happy log hunting!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this tutorial, we will take you on a journey through the labyrinth of directories and unveil the secret locations of common log files on Linux. Whether you&#8217;re a beginner or an experienced user, this guide will equip you with the knowledge to easily access and analyze these crucial logs.<\/p>\n","protected":false},"author":8,"featured_media":3394,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[5],"tags":[],"class_list":["post-3392","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebase"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/05\/Locations-of-Common-Log-Files-on-Linux.png?fit=600%2C330&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ISfL-SI","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":3225,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-find-the-largest-files-in-linux\/","url_meta":{"origin":3392,"position":0},"title":"How to find the largest files in Linux","author":"George B.","date":"April 12, 2023","format":false,"excerpt":"When you have a server with 1TB of disk space and your storage is 80% full, it is important to find out which files(largest files) are taking up the most space on your system. This can be done by identifying the biggest files on your system and deleting or moving\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/www.virtono.com\/community\/category\/tutorial-how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/04\/How-to-find-largest-files-linux.png?fit=600%2C330&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/04\/How-to-find-largest-files-linux.png?fit=600%2C330&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/04\/How-to-find-largest-files-linux.png?fit=600%2C330&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":3875,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/linux-how-to-search-text-in-a-pdf-file-via-command-line\/","url_meta":{"origin":3392,"position":1},"title":"Linux: How to search text in a PDF file via Command Line","author":"George B.","date":"September 15, 2023","format":false,"excerpt":"In this tutorial, we will explain how to search text in a PDF file using Linux command-line options. One of Linux's many advantages is its command-line interface (CLI), which allows users to complete difficult tasks using short, text-based commands. Linux Basics It's essential to understand what a PDF file is\u2026","rel":"","context":"In &quot;Tutorials&quot;","block_context":{"text":"Tutorials","link":"https:\/\/www.virtono.com\/community\/category\/tutorial-how-to\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/09\/How-to-search-text-in-a-PDF-file-via-Command-Line.png?fit=360%2C240&ssl=1&resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1795,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/10-linux-basic-commands-every-user-should-know\/","url_meta":{"origin":3392,"position":2},"title":"10 Linux Basic Commands Every User Should Know","author":"Shreyash Sharma","date":"July 31, 2020","format":false,"excerpt":"Linux can be daunting to some, especially if you have seen people working only through the terminal. Trust me, its not as complicated as it seems neither is it that hard to learn. The only issue is manufacturers do not Linux with their systems. What is Linux? The entire family\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/07\/7rQQixjPnrQv.png?fit=640%2C363&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/07\/7rQQixjPnrQv.png?fit=640%2C363&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/07\/7rQQixjPnrQv.png?fit=640%2C363&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":3595,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/how-to-protect-your-server-against-brute-force-attacks\/","url_meta":{"origin":3392,"position":3},"title":"How to Protect Your Server Against Brute Force Attacks","author":"George B.","date":"June 23, 2023","format":false,"excerpt":"Introduction Brute force attacks are one of the most common threats that server administrators face. This guide is designed to provide you with the knowledge and strategies you need to protect your server from brute force attacks. What is a Server Brute Force Attack A server brute force attack is\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/How-to-Protect-Your-Server-Against-Brute-Force-Attacks.png?fit=600%2C330&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/How-to-Protect-Your-Server-Against-Brute-Force-Attacks.png?fit=600%2C330&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/How-to-Protect-Your-Server-Against-Brute-Force-Attacks.png?fit=600%2C330&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":881,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/linux-security-privacy-on-linuxencryption\/","url_meta":{"origin":3392,"position":4},"title":"Linux Security: Privacy on Linux(Encryption)","author":"Daniel Draga","date":"January 26, 2017","format":false,"excerpt":"Security is an important but complex topic. So I'll be doing a series of articles, focusing on the principles and working of security of Linux. The challenge is that it\u2019s an ever-changing idea. Software we think of as secure can become insecure as hackers figure out how to break though\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/linux-ransomware-wide.jpeg?fit=600%2C315&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/linux-ransomware-wide.jpeg?fit=600%2C315&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/01\/linux-ransomware-wide.jpeg?fit=600%2C315&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":1755,"url":"https:\/\/www.virtono.com\/community\/tutorial-how-to\/how-to-install-and-configure-prometheus-on-a-linux-server\/","url_meta":{"origin":3392,"position":5},"title":"How To Install and Configure Prometheus On a Linux Server","author":"Shreyash Sharma","date":"July 27, 2020","format":false,"excerpt":"Introduction Prometheus is an open-source monitoring system developed by SoundCloud. Development on Prometheus started back in 2012 when SoundCloud felt that the existing monitoring systems were proving insufficient for their needs. It uses a time-series database just like Druid, InfluxDB, Graphite. However, Prometheus is able to work on a multi-dimensional\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/07\/1_yz1TgEsIb9qNtmv2O-SZsg.png?fit=1200%2C675&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/07\/1_yz1TgEsIb9qNtmv2O-SZsg.png?fit=1200%2C675&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/07\/1_yz1TgEsIb9qNtmv2O-SZsg.png?fit=1200%2C675&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/07\/1_yz1TgEsIb9qNtmv2O-SZsg.png?fit=1200%2C675&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/07\/1_yz1TgEsIb9qNtmv2O-SZsg.png?fit=1200%2C675&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/3392","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/comments?post=3392"}],"version-history":[{"count":2,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/3392\/revisions"}],"predecessor-version":[{"id":3397,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/3392\/revisions\/3397"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media\/3394"}],"wp:attachment":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media?parent=3392"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/categories?post=3392"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/tags?post=3392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}