Cisco Cisco Packet Data Interworking Function (PDIF)
System Logs
Configuring Event Logging Parameters ▀
ASR 5000 System Administration Guide, StarOS Release 18 ▄
177
Configuring Event Logging Parameters
The system can be configured to generate logs based on user-defined filters. The filters specify the facilities (system
tasks or protocols) that the system is to monitor and severity levels at which to trigger the generation of the event
entries.
tasks or protocols) that the system is to monitor and severity levels at which to trigger the generation of the event
entries.
Event logs are stored in system memory and can be viewed via the CLI. There are two memory buffers that store event
logging information. The first buffer stores the active log information. The second buffer stores inactive logging
information. The inactive buffer is used as a temporary repository to allow you to view logs without having data be
overwritten. Logs are copied to the inactive buffer only through manual intervention.
logging information. The first buffer stores the active log information. The second buffer stores inactive logging
information. The inactive buffer is used as a temporary repository to allow you to view logs without having data be
overwritten. Logs are copied to the inactive buffer only through manual intervention.
Each buffer can store up to 50,000 events. Once these buffers reach their capacity, the oldest information is removed to
make room for the newest.
make room for the newest.
To prevent the loss of log data, the system can be configured to transmit logs to a syslog server over a network interface.
Important:
For releases after 15.0 MR4, TACACS+ accounting (CLI event logging) will not be generated for
Lawful Intercept users (priv-level 15 and 13).
Configuring Event Log Filters
Follow the example below to configure run time event logging parameters for the system:
configure
logging filter runtime facility facility level report_level
logging display { event-verbosity | pdu-data | pdu-verbosity }
end
Notes:
Configure the logging filter that determines which system facilities should be logged and at what levels. For
Repeat for every facility that you would like to log.
Optional: Configure event ID restrictions by adding the logging disable eventid command. The system provides
the ability to restrict the sending of a specific event ID or a range of event IDs to minimize the amount of data
logged to that which is most useful. Repeat to disable logging for additional event IDs or event ID ranges.
logged to that which is most useful. Repeat to disable logging for additional event IDs or event ID ranges.
Save the configuration as described in the Verifying and Saving Your Configuration chapter.