No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


eSight V300R010C00 Maintenance Guide 07

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Checking eSight Logs

Checking eSight Logs

A log records the operations and major events of the eSight. Maintenance personnel must periodically check eSight logs to learn about user operations that may influence eSight operation or security, and take measures in a timely manner, which ensures the normal operation of eSight.


eSight logs are classified into security logs, system logs, and operation logs.

  • Security logs record security operations that are performed on the eSight, such as logging in to the server, changing passwords, creating users, and logging out of the server.
  • System logs record service-related system events and operations triggered by timely or periodic tasks. For example, some alarms are discarded if the number of masked alarms exceeds the maximum, or alarms are automatically acknowledged based on automatic alarm acknowledgment rules.
  • Operation logs record the user operations that are performed on the eSight, such as creating monitoring views and modifying device managers.

Reference Standard

  • No error information is contained in logs.
  • No error information about user creation or login is contained in logs.


  1. Log in to the eSight.
  2. Choose System > System Management > Log Management from the main menu.
  3. In the navigation tree in the left pane, choose Security Logs, System Logs or Operation Logs.
  4. On the page, view the log information, or set search criteria to view specified log information.

    After clicking the value in the Details column of the target log, you can view logs details.


    A maximum of 800 characters can be displayed in Details. Contents other than the first 800 characters are displayed as ....

    The eSight server time is used for the filter criteria Time period. The value is 24 hours before the current time. For example, if the current time is 11:00:00, November 12, 2012, the default value of Time period is from 11:00:00, November 11, 2012 to 11:00:00, November 12, 2012.

  5. You can export the logs and back them up for future analysis.

    Switching between pages will cause log exporting to be interrupted.



    Export all logs

    1. Click Export All to export all logs.
    2. In the File Download dialog box, click Save.
    3. Select a save path and click Save.

    Log files must be saved in .csv format.

    Export the selected logs

    1. In the log list, select the check box before Event Name of the required log.
    2. Click Export Selected to export the selected logs.
    3. In the File Download dialog box, click Save.
    4. Select a save path and click Save.

    Log files must be saved in .csv format.

Exception Handling

  • Undo error or exception operations in a timely manner.
  • Audit the accounts and rights for users who performed multiple login attempts but failed. Delete temporary accounts when routine maintenance is complete.
Updated: 2019-06-30

Document ID: EDOC1100044373

Views: 25105

Downloads: 74

Average rating:
This Document Applies to these Products
Related Documents
Related Version
Previous Next