"FD 100/320Gbps NT and FX NT IHub System
Basics, Management and OAM Guide"
Events and Logs
Issue: 10 3HH-11982-AAAA-TQZZA 105
6 Events and Logs
6.1 In this Chapter
6.2 Logging Overview
6.3 Log Destinations
6.4 Event Logs
6.5 Configuration Notes
6.6 Configuring Logging with CLI
6.7 Log CLI Command Reference
6.8 Log CLI Commands
6.1 In this Chapter
This chapter provides information about configuring event logs in the ISAM.
6.2 Logging Overview
The primary type of logging supported in the ISAM is event logging.
Event logging controls the generation, propagation and recording of system events
for monitoring status and troubleshooting faults within the system. The ISAM groups
events into three major categories or event sources:
• Security events — Events that pertain to attempts to breach system security.
• Change events — Events that pertain to the configuration and operation of the
node.
• Main events — Events that pertain to ISAM applications that are not assigned to
other event categories/sources.
• Debug events — Events that pertain to trace or other debugging information.
The following are events within the ISAM and have the following characteristics:
• A time stamp in UTC or local time.
• The generating application.
• A unique event ID within the application.
• The VRF-ID.