Cisco Cisco Packet Data Interworking Function (PDIF) Guía Para Resolver Problemas
Configuring and Viewing System Logs
▀ Configuring Event Logging Parameters
▄ Cisco ASR 5000 Series System Administration Guide
OL-22970-01
Configuring Event Logging Parameters
The system can be configured to generate logs based on user-defined filters. The filters specify the facilities (system
tasks or protocols) that the system is to monitor and severity levels at which to trigger the generation of the event log.
tasks or protocols) that the system is to monitor and severity levels at which to trigger the generation of the event log.
Event logs are stored in system memory and can be viewed via the CLI. There are two memory buffers that store event
logging information. The first buffer stores the active log information. The second buffer stores inactive logging
information. The inactive buffer is used as a temporary repository to allow you to view logs without having data be
overwritten. Logs are copied to the inactive buffer only through manual intervention.
logging information. The first buffer stores the active log information. The second buffer stores inactive logging
information. The inactive buffer is used as a temporary repository to allow you to view logs without having data be
overwritten. Logs are copied to the inactive buffer only through manual intervention.
Each buffer can store up to 50,000 events. Once these buffers reach their capacity, the oldest information is removed to
make room for the newest.
make room for the newest.
To prevent the loss of log data, the system can be configured to transmit logs to a syslog server over a network interface.
Configuring Event Log Filters
Follow the example below to configure run time event logging parameters for the system:
Notes:
Configure the logging filter that determines which system facilities should be logged and at what levels.
Repeat for every facility that you would like to log.
Option: Configure event ID restrictions by adding the logging disable eventid command. The system provides
the ability to restrict the sending of a specific event ID or a range of event IDs to minimize the amount of data
logged to that which is most useful. Repeat to disable logging for additional event IDs or event ID ranges.
logged to that which is most useful. Repeat to disable logging for additional event IDs or event ID ranges.
Save the configuration as described in the Verifying and Saving Your Configuration chapter.
Configuring Syslog Servers
Information generated by the run time event logging filters can be transmitted to a syslog server for permanent storage.