Monitoring and Logging System Information
237
What Are the Severity Levels?
For each local or remote log file, you can specify the severity of the messages
to log. Each severity level is identified by a name and a number. Table 10-1
provides information about the severity levels.
When you specify the severity level, messages with that severity level and
higher are sent to the log file. For example, if you specify the severity level as
critical, messages with a severity level of alert and emergency are also logged.
When you specify the severity level in a CLI command, you can use the
keyword or the numerical level.
What Are the System Startup and Operation Logs?
Two types of log files exist in flash (persistent) memory:
• The first log type is the system startup log. The system startup log stores
the first 32 messages received after system reboot. The log file stops when
it is full.
• The second log type is the system operation log. The system operation log
stores the last 1000 messages received during system operation. The oldest
messages are overwritten when the file is full.
A message is only logged in one file. On system startup, if the Log file is
enabled, the startup log stores messages up to its limit. Then the operation
log begins to store the messages.
Table 10-1. Log Message Severity
Severity Keyword Severity Level Description
emergencies
0
The switch is unusable.
alerts
1
Action must be taken immediately.
critical
2
The switch is experiencing critical conditions.
errors
3
The switch is experiencing error conditions.
warnings
4
The switch is experiencing warning conditions.
notification
5
The switch is experiencing normal but significant
conditions.
informational
6
The switch is providing non-critical information.
debugging
7
The switch is providing debug-level information.
Содержание PowerConnect 7024
Страница 134: ...134 Setting Basic Network Information ...
Страница 290: ...290 Managing General System Settings Figure 11 14 SNTP Servers Table ...
Страница 348: ...348 Configuring SNMP ...
Страница 430: ...430 Monitoring Switch Traffic ...
Страница 444: ...444 Configuring iSCSI Optimization ...
Страница 521: ...Configuring 802 1X and Port Based Security 521 Figure 19 8 Configure Port Security Settings 5 Click Apply ...
Страница 538: ...538 Configuring 802 1X and Port Based Security ...
Страница 585: ...Configuring VLANs 585 Figure 21 5 Add Ports to VLAN 4 Click Apply 5 Verify that the ports have been added to the VLAN ...
Страница 594: ...594 Configuring VLANs Figure 21 16 GVRP Port Parameters Table ...
Страница 600: ...600 Configuring VLANs Figure 21 23 Double VLAN Port Parameter Table ...
Страница 658: ...658 Configuring the Spanning Tree Protocol ...
Страница 693: ...Configuring Port Based Traffic Control 693 Figure 24 3 Storm Control 5 Click Apply ...
Страница 780: ...780 Configuring Connectivity Fault Management ...
Страница 804: ...804 Snooping and Inspecting Traffic Figure 27 17 DAI Interface Configuration Summary ...
Страница 818: ...818 Snooping and Inspecting Traffic ...
Страница 836: ...836 Configuring Link Aggregation ...
Страница 882: ...882 Configuring DHCP Server Settings ...
Страница 916: ...916 Configuring L2 and L3 Relay Features Figure 33 3 DHCP Relay Interface Summary ...
Страница 924: ...924 Configuring L2 and L3 Relay Features Figure 33 12 IP Helper Statistics ...
Страница 930: ...930 Configuring L2 and L3 Relay Features ...
Страница 1004: ...1004 Configuring OSPF and OSPFv3 ...
Страница 1044: ...1044 Configuring VRRP ...
Страница 1057: ...Configuring IPv6 Routing 1057 Figure 37 9 IPv6 Route Preferences ...
Страница 1064: ...1064 Configuring IPv6 Routing ...
Страница 1084: ...1084 Configuring DHCPv6 Server and Relay Settings ...
Страница 1091: ...Configuring Differentiated Services 1091 Figure 39 5 DiffServ Class Criteria ...
Страница 1114: ...1114 Configuring Differentiated Services ...
Страница 1130: ...1130 Configuring Class of Service ...
Страница 1136: ...1136 Configuring Auto VoIP ...
Страница 1216: ...1216 Managing IPv4 and IPv6 Multicast ...