No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search


To have a better experience, please upgrade your IE browser.


eLog V200R007C10 Installation Guide

Describes the installation process of product software. Includes plans, environmental requirements, and procedures for installation, as well as commissioning procedures.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Parameter Description and Planning

Parameter Description and Planning

This section describes pre-installation parameters in a pre-installation scenario.

eLog User Password List


The user passwords are default ones for pre-installation. You can change the passwords as required.


User Name


SUSE Linux operating system administrator



SUSE Linux operating system eLog user



MySQL database administrator



MySQL database user



eLog administrator for Web login



User for iBMC management port web login



Huawei FusionServer 2288H V5 server BIOS user



Host Names and IP Addresses


The host name and IP address of the eLog collector must be planned only for distributed deployment.


Planning Example


Host name of the eLog analyzer


  • The eLog analyzer host name must be unique on the network.
  • The host name consists of letters (A to Z or a to z), digits, and hyphens (-), and must start with a letter.
  • Host names are case-sensitive.
  • Single-character host names are not allowed. That is, each host name must contain at least 2 characters.

Host name of the eLog collector


The requirements are the same as those for the host name of the eLog collector.

IP address of the eLog analyzer

IP address:

Subnet mask:

Default gateway:

  • The IP address must be a static one.
  • Only an IPv4 address is supported.
  • The IP address must be unique on the network.
  • The eLog analyzer can communicate with managed log sources.
  • The eLog analyzer can communicate with the eLog collector.

IP address of the eLog collector

IP address:

Subnet mask:

Default gateway:

The requirements are the same as those for the IP address of the eLog analyzer.

The IP addresses of the eLog analyzer and collector must be in the same network segment.

Route planning


The eLog analyzer, eLog collector, and managed log sources may be in different LANs. To allow them to communicate, you need to plan routes.

Route planning must comply with the following rules:

  • Reachability:

1. You can ping through all managed log sources and the eLog collector from the eLog analyzer.

2. You can ping through all managed log sources from the eLog collector.

  • Route security: Static routes are recommended to secure the communication between the eLog server and others.

Static routes are manually configured by an administrator and cannot automatically adopt network topology changes. Static routes are enough to ensure the normal services on a simple network. The proper configuration and application of static routes improve network performance and ensure bandwidth for important applications. However, if a fault occurs or the network topology changes, static routes cannot automatically change. Instead, the administrator must manually change the routes.

Installation Path


The pre-installation path of the eLog system cannot be changed.


Default Path



Time Zone Planning



Time zone


Port Planning

Security hardening has been completed in the pre-installation scenario. After security hardening, the firewall function is enabled. Certain ports are automatically added to the firewall exception service. For details on the open ports, see Communication Matrix.

If security hardening is performed, the remote GUI is unavailable. You can only log in to the server as the root user through the management interface for uninstallation. If you want to perform the uninstallation through the remote GUI, add the VNC Server service to the firewall exception service according to section Adding Exceptions on the Firewall.

Updated: 2019-04-01

Document ID: EDOC1100073937

Views: 9223

Downloads: 16

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Previous Next