1006
C
HAPTER
60: I
NFORMATION
C
ENTER
begin
: Optioanl parameter, displays all items beginning friom the matching item.
exclude
: Optional parameter, only displays the matching items.
include
: Optional parameter, only displays the non-matching items..
text
: Defines the regular expression.
Description
Use the
display logbuffer
command to view the attribute of logbuffer and the
information recorded in logbuffer.
All log messages are saved in the log buffer. When the log buffer is full, the latest
message will overlap the earliest one.
The displaying sequence of all log messages is from the newest message to the
oldest one.
When you input
size
, if the size of current configured log messages is bigger than
the
logsize
, the system will search for the messages on the following principles.
■
If you input
reverse
, the system will search for
logsize
matiching messages
from the oldest one( the head of the log buffer)
,
then displays them from the
newest message to the oldest one.
■
If you do not input
inverse
, the system will search for the
logsize
matiching
messages from the newest one( the end of the log buffer)
,
then displays them
from the newest message to the oldest one.
Example
# Show the system logbuffer attribute and the log information in logbuffer.
<SW8800> display logbuffer
Logging buffer configuration and contents:enabled
Allowed max buffer size : 1024
Actual buffer size : 512
Table 142
Special characters in the regular expression
Special
characters
Description
Restriction
_
Underscore, similar to a wildcard
and can stand for these characters:
(^|$|[,(){} ])
A space, the beginning of the input
string, the end of the input string
If the first character in the regular
expression is not a underscore, then
there is no restriction on the
number of the underscore (but it is
restricted by the command length)
If the first character in the regular
expression is an underscore, then
there should be less than five
consecutive underscores.
If the underscores in a command
are discrete, on the first group of
underscores are filtered for the
output information, but not the
subsequent underscores.
(
Left parenthesis, push flag in
program
It is recommended not to use this
character in the regular expression.
Summary of Contents for Switch 8807
Page 30: ......
Page 68: ...66 CHAPTER 2 COMMANDS USED TO LOG IN TO SWITCH ...
Page 78: ...76 CHAPTER 3 CONFIGURATION FILE MANAGEMENT COMMANDS ...
Page 96: ...94 CHAPTER 5 SUPER VLAN CONFIGURATION COMMANDS ...
Page 122: ...120 CHAPTER 8 IP PERFORMANCE CONFIGURATION COMMANDS ...
Page 130: ...128 CHAPTER 9 GARP GVRP CONFIGURATION COMMANDS ...
Page 162: ...160 CHAPTER 11 ETHERNET LINK AGGREGATION CONFIGURATION COMMANDS ...
Page 212: ...210 CHAPTER 13 MSTP CONFIGURATION COMMANDS ...
Page 234: ...232 CHAPTER 16 ACL COMMANDS ...
Page 282: ...280 CHAPTER 18 ACL CONTROL COMMANDS TO CONTROL LOGIN USERS ...
Page 293: ......
Page 294: ...292 CHAPTER 19 VLAN ACL CONFIGURATION COMMANDS ...
Page 310: ...308 CHAPTER 20 802 1X CONFIGURATION COMMANDS ...
Page 370: ...368 CHAPTER 21 AAA AND RADIUS HWTACACS PROTOCOL CONFIGURATION COMMANDS ...
Page 398: ...396 CHAPTER 23 STATIC ROUTE CONFIGURATION COMMANDS ...
Page 462: ...460 CHAPTER 25 OSPF CONFIGURATION COMMANDS ...
Page 498: ...496 CHAPTER 26 INTEGRATED IS IS CONFIGURATION COMMANDS ...
Page 548: ...546 CHAPTER 27 BGP CONFIGURATION COMMANDS ...
Page 570: ...568 CHAPTER 30 RECURSIVE ROUTING CONFIGURATION ...
Page 584: ...582 CHAPTER 32 MULTICAST VLAN CONFIGURATION COMMANDS ...
Page 600: ...598 CHAPTER 33 MULTICAST COMMON CONFIGURATION COMMANDS ...
Page 604: ...602 CHAPTER 34 STATIC MULTICAST MAC ADDRESS CONFIGURATION COMMAND ...
Page 656: ...654 CHAPTER 37 MSDP CONFIGURATION COMMANDS ...
Page 682: ...680 CHAPTER 38 MBGP MULTICAST EXTENSION CONFIGURATION COMMANDS ...
Page 762: ...760 CHAPTER 40 BGP MPLS VPN CONFIGURATION COMMANDS ...
Page 808: ...806 CHAPTER 44 HA CONFIGURATION COMMANDS_HA_CONFIGURATION ...
Page 820: ...818 CHAPTER 45 ARP CONFIGURATION COMMANDS ...
Page 824: ...822 CHAPTER 46 ARP TABLE SIZE CONFIGURATION COMMANDS max arp entry config of slot 13 8192 ...
Page 862: ...860 CHAPTER 47 DHCP CONFIGURATION COMMANDS ...
Page 870: ...868 CHAPTER 48 DNS CONFIGURATION COMMANDS ...
Page 972: ...970 CHAPTER 56 SSH TERMINAL SERVICE CONFIGURATION COMMANDS ...
Page 982: ...980 CHAPTER 57 FILE SYSTEM MANAGEMENT COMMANDS ...
Page 1026: ...1024 CHAPTER 60 INFORMATION CENTER ...
Page 1046: ...1044 CHAPTER 63 PORT PACKET STATISTICS COMMANDS ...
Page 1051: ...Ethernet Port Detection Configuration Commands 1049 ...
Page 1052: ...1050 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1053: ...Ethernet Port Detection Configuration Commands 1051 ...
Page 1054: ...1052 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1055: ......
Page 1056: ...1054 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1057: ......
Page 1058: ...1056 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1059: ...Ethernet Port Detection Configuration Commands 1057 ...
Page 1060: ...1058 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1061: ......
Page 1062: ...1060 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1063: ...Ethernet Port Detection Configuration Commands 1061 ...
Page 1064: ...1062 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1065: ......
Page 1066: ...1064 CHAPTER 64 PORT LOOPBACK DETECTION COMMANDS ...
Page 1090: ...1088 CHAPTER 66 NQA CONFIGURATION COMMANDS ...