52
Table 9 Default output rule for security logs
Security log file All supported modules Disabled Debugging
Default output rules for hidden logs
Hidden logs can be output to the log host, the log buffer, and the log file. Table 10 shows the default
output rules for hidden logs.
Table 10 Default output rules for hidden logs
Log host All supported modules Enabled Informational
Log buffer All supported modules Enabled Informational
Log file All supported modules Enabled Informational
Default output rules for trace logs
Trace logs can only be output to the trace log file, and cannot be filtered by source modules and
severity levels. Table 11 shows the default output rules for trace logs.
Table 11 Default output rules for trace logs
Trace log file All supported modules Enabled Debugging
Log formats
The format of logs varies by output destination. Table 12 shows the original format of log information,
which might be different from what you see. The actual format depends on the log resolution tool
used.
Table 12 Log formats
Output
Format Example
terminal, log buffer, or
log file
Module/Level/Mnemonic: Content
%Nov 24 14:21:43:502 2010 HPE
SYSLOG/6/SYSLOG_RESTART:
System restarted –-
HPE Comware Software.
Log host
Standard format:
<PRI>Timestamp
Sysname %%vvModule/Level/Mnemonic:
Source; Content
Standard format:
<190>Nov 24 16:22:21 2010
HPE %%10SYSLOG/6/SYSLOG_RE
START: -
restarted –-
HPE Comware Software.
Table 13 describes the fields in a log message.