No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

CloudEC V600R019C00 Security Maintenance (Enterprise On-premises, Only Conference)

Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Checking SMC2.0 Logs

Checking SMC2.0 Logs

SMC2.0 logs include system and debug logs. System logs include run, security, and operation logs.

  • Run logs: logs about system running, such as system exceptions and service failures.
  • Security logs: logs related to security, such as login authentication and changes to key system or device parameters.
  • Operation logs: logs about conference operations, device management, and changes to common parameters.
  • Debug logs: troubleshooting logs.

Viewing Logs

You can check logs to figure out what has happened to the system.
  1. Log in to the SMC2.0 web interface.
  2. Choose Settings > Logs.
  3. Find the log you want to view.

Log Suppression Policies

  • To prevent continuous accumulation of system logs in the database from affecting service performance, the system automatically exports system logs of different types from the database for backup and deletes them in the database. In this way, the log quantity can be maintained within a proper range in the system log database.
    • The upper limit for run logs is 600,000. When the number of run logs reaches or exceeds the upper limit, the system automatically backs up and deletes run logs until only 400,000 run logs remain. During the backup, the maximum size for a single backup log file is 1 GB, and the maximum size for all backup log files is 4 GB.
    • The upper limit for operation logs is 800,000. When the number of operation logs reaches or exceeds the upper limit, the system automatically backs up and deletes operation logs until only 500,000 run logs remain. During the backup, backup log files are prefixed with Op, the maximum size for a single backup log file is 1 GB, and the maximum size for all backup log files is 5 GB.
    • The upper limit for security logs is 100,000. When the number of security logs reaches or exceeds the upper limit, the system automatically backs up and deletes security logs until only 100,000 run logs remain. During the backup, backup log files are prefixed with Sec, the maximum size for a single backup log file is 1 GB, and the maximum size for all backup log files is 1 GB.
  • A total of 4,000,000 debug logs are retained.
  • Duplicate logs in a specified period are automatically merged.
Translation
Download
Updated: 2019-08-07

Document ID: EDOC1100059091

Views: 16610

Downloads: 9

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Share
Previous Next