HP 6125XLG R2306-HP 6125XLG Blade Switch Network Management and Monitoring Con - Page 67

Enabling synchronous information output, Enabling duplicate log suppression

Page 67 highlights

Task Command 1. system-view Change the directory of the security log file. 2. info-center security-logfile directory dir-name Manually save all the contents in the security log file buffer into the security log file. security-logfile save Remarks By default, the security log file is saved in the seclog directory in the root directory of the storage medium. The configuration made by this command cannot survive an IRF reboot or a master/subordinate switchover. Available in any view. Enabling synchronous information output The output of system logs interrupts ongoing configuration operations. You have to find the previously input commands before the logs. Synchronous information output can show the previous input after log output and a command prompt in command editing mode, or a [Y/N] string in interaction mode so you can continue your operation from where you were stopped. To enable synchronous information output: Step 1. Enter system view. 2. Enable synchronous information output. Command system-view info-center synchronous Remarks N/A By default, synchronous information output is disabled. Enabling duplicate log suppression The output of consecutive duplicate logs at an interval of less than 30 seconds wastes system and network resources, making it difficult for network administrators to find useful information and maintain the device. With this feature enabled, the system starts a suppression period upon outputting a log: • During the suppression period, the system does not output logs that have the same module name, level, mnemonic, location, and text as the previous log. • After the suppression period expires, if the same log continues to appear, the system outputs the suppressed logs and the log number and starts another suppression period. The suppression period is 30 seconds for the first time, 2 minutes for the second time, and 10 minutes for subsequent times. • If a different log is generated during the suppression period, the system aborts the current suppression period, outputs suppressed logs and the log number and then the different log, and starts another suppression period. To enable duplicate log suppression: Step 1. Enter system view. Command system-view Remarks N/A 61

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148

61
Task
Command
Remarks
Change the directory of the security
log file.
1.
system-view
2.
info-center security-logfile
directory
dir-name
By default, the security log file is
saved in the
seclog
directory in the
root directory of the storage
medium.
The configuration made by this
command cannot survive an IRF
reboot or a master/subordinate
switchover.
Manually save all the contents in
the security log file buffer into the
security log file.
security-logfile save
Available in any view.
Enabling synchronous information output
The output of system logs interrupts ongoing configuration operations. You have to find the previously
input commands before the logs. Synchronous information output can show the previous input after log
output and a command prompt in command editing mode, or a [Y/N] string in interaction mode so you
can continue your operation from where you were stopped.
To enable synchronous information output:
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enable synchronous
information output.
info-center synchronous
By default, synchronous
information output is disabled.
Enabling duplicate log suppression
The output of consecutive duplicate logs at an interval of less than 30 seconds wastes system and network
resources, making it difficult for network administrators to find useful information and maintain the
device.
With this feature enabled, the system starts a suppression period upon outputting a log:
During the suppression period, the system does not output logs that have the same module name,
level, mnemonic, location, and text as the previous log.
After the suppression period expires, if the same log continues to appear, the system outputs the
suppressed logs and the log number and starts another suppression period. The suppression period
is 30 seconds for the first time, 2 minutes for the second time, and 10 minutes for subsequent times.
If a different log is generated during the suppression period, the system aborts the current
suppression period, outputs suppressed logs and the log number and then the different log, and
starts another suppression period.
To enable duplicate log suppression:
Step
Command
Remarks
1.
Enter system view.
system-view
N/A