Table 9 Default output rule for security logs
Destination
Security log file
Default output rules for hidden logs
Hidden logs can be output to the log host, the log buffer, and the log file.
output rules for hidden logs.
Table 10 Default output rules for hidden logs
Destination
Log host
Log buffer
Log file
Default output rules for trace logs
Trace logs can only be output to the trace log file, and cannot be filtered by source modules and
severity levels.
Table 11 Default output rules for trace logs
Destination
Trace log file
Log formats
The format of logs varies by output destination.
which might be different from what you see. The actual format depends on the log resolution tool
used.
Table 12 Log formats
Output
destination
Console,
terminal, log buffer, or
log file
Log host
Table 13
describes the fields in a log message.
Log source modules
All supported modules
Log source modules
All supported modules
All supported modules
All supported modules
Table 11
shows the default output rules for trace logs.
Log source modules
All supported modules
Format
monitor
Prefix
Timestamp
Module/Level/Mnemonic: Content
Standard
<PRI>Timestamp
Sysname %%vvModule/Level/Mnemonic:
Source; Content
Output switch
Disabled
Output switch
Enabled
Enabled
Enabled
Output switch
Enabled
Table 12
shows the original format of log information,
Example
%Nov 24 14:21:43:502 2010 HPE
SYSLOG/6/SYSLOG_RESTART:
Sysname
System restarted –-
HPE Comware Software.
Standard
<190>Nov
format:
HPE %%10SYSLOG/6/SYSLOG_RE
START:
restarted –-
HPE Comware Software.
52
Severity
Debugging
Table 10
shows the default
Severity
Informational
Informational
Informational
Severity
Debugging
format:
24
16:22:21
2010
-DevIP=1.1.1.1;
System