Cisco Cisco Email Security Appliance C650 Guía Del Usuario
38-39
Cisco AsyncOS 9.0 for Email User Guide
Chapter 38 Logging
Log Subscriptions
Configuring Log Subscriptions
Use the Log Subscriptions page on the System Administration menu (or the
logconfig
command in the
CLI) to configure a log subscription. Log subscriptions create log files that store information about
AsyncOS activity, including errors. A log subscription is either retrieved or delivered (pushed) to another
computer. Generally, log subscriptions have the following attributes:
AsyncOS activity, including errors. A log subscription is either retrieved or delivered (pushed) to another
computer. Generally, log subscriptions have the following attributes:
Log Levels
Log levels determine the amount of information delivered in a log. Logs can have one of five levels of
detail. A more detailed setting creates larger log files and puts more drain on system performance. More
detailed settings include all the messages contained in less detailed settings, plus additional messages.
As the level of detail increases, system performance decreases.
detail. A more detailed setting creates larger log files and puts more drain on system performance. More
detailed settings include all the messages contained in less detailed settings, plus additional messages.
As the level of detail increases, system performance decreases.
Note
Log levels may be selected for all mail log types.
Table 38-32
Log File Attributes
Attribute
Description
Log type
Defines the type of information recorded and the format of the log
subscription. See Table 38-1, “Log Types,” on page 2 for more
information.
subscription. See Table 38-1, “Log Types,” on page 2 for more
information.
Name
Nickname for the log subscription to be used for your future reference.
Rollover by File Size
The maximum size the file can reach before rolling over.
Rollover by Time
Sets the time interval for file rollovers.
Log level
Sets the level of detail for each log subscription.
Retrieval method
Defines how the log subscription will be obtained from the Email Security
appliance.
appliance.
Log filename
Used for the physical name of the file when written to disk. If multiple
Email Security appliances are being used, the log filename should be
unique to identify the system that generated the log file.
Email Security appliances are being used, the log filename should be
unique to identify the system that generated the log file.
Table 38-33
Log Levels
Log Level
Description
Critical
The least detailed setting. Only errors are logged. Using this setting will not
allow you to monitor performance and other important activities; however,
the log files will not reach their maximum size as quickly. This log level is
equivalent to the syslog level “Alert.”
allow you to monitor performance and other important activities; however,
the log files will not reach their maximum size as quickly. This log level is
equivalent to the syslog level “Alert.”
Warning
All errors and warnings created by the system. Using this setting will not
allow you to monitor performance and other important activities. This log
level is equivalent to the syslog level “Warning.”
allow you to monitor performance and other important activities. This log
level is equivalent to the syslog level “Warning.”
Information
The information setting captures the second-by-second operations of the
system. For example, connections opened or delivery attempts. The
Information level is the recommended setting for logs. This log level is
equivalent to the syslog level “Info.”
system. For example, connections opened or delivery attempts. The
Information level is the recommended setting for logs. This log level is
equivalent to the syslog level “Info.”