Toshiba Stratagy 4 Installation And Maintenance Manual page 227

Hide thumbs Also See for Stratagy 4:
Table of Contents

Advertisement

STRATAGY
4/
6/
24
INSTALLATION
AND
MAINTENANCE
MANUAL
SEPTEMBER
1994
4 TRACKING THE STRATAGY
SYSTEM
Stratagy
log. Logs startup information,
execution
error
information,
system actions, and shutdown
information.
Tracking the Stratagy system involves analyzing
system
Parameter:
lognam.
Default activity: active.
operation
and User ID activity. This section discusses:
n
Stratagy Main Menu and Users Menu information
q
Stratagy log information
Default name: Stratagy.LOG.
NOTE:
This file keeps
growing
slowly.
Periodically
archive or delete it once or twice a year.
4.1
MAIN
MENU
AND
USERS MENU
Message
log. Logs every received message
and every
INFORMATION
User ID that checks for messages
along with the DTMF
To track system operation,
viewing the system activity
entered.
statistics of the Main Menu provides information
about:
Parameter:
msg-log.
*
n Port activity and CPU usage
Default activity: inactive.
Default name: MSG.LOG.
q Number of defined User ID mailboxes
NOTE:
n Available disk space in time and percent of the disk
I
Number of calls answered
since the system started
1
Notify activity
When active, grows quickly. Archive
or delete
frequently
User ID log. Logs the date, time, and User ID number
whenever
a User ID is accessed
via DTMF. Useful for
n
Date and time system last started
R Next date and time of scheduled shutdown
n
Fax port activity
creating a data file which can later be analyzed
for call
distributions
and accesses by dates, days, and times.
Parameter:
user-log.
Default activity: inactive.
For details,
see the Programming
section,
Chapter
3,
Default name: USERID.LOG.
"Accessing and Using Stratagy," "Using the Main Menu."
NOTE:
To track User ID activity, viewing the User ID statistics of
When active, grows quickly. Archive
or delete
the Users Menu or generating
a report based on these
frequently
statistics, provides information
about:
H Date and time User ID was created
E Date and time User ID was last modified
5 REMOVING
AND REPLACING
H When date and time statistics were last reset
COMPONENTS
n
Message activity
Before removing and replacing components,
you need to
know:
H Caller activity
n
How to safely
open
a personal
computer
and
n
User activity
install/remove
cards in the computer.
For details,
see the Programming
section,
Chapter
4,
n
How to identify
basic components
of a personal
"Customizing
User ID Mailboxes,"
'Using
the Users
computer:
e.g., motherboard,
video board, controller
Menu."
board, voice board, disk drives, power supply, cables,
etc.
4.2
STRATAGY
LOG INFORMATION
This section discusses:
If you
need
more
system
operation
or User
ID
information,
Stratagy provides the following logs. Use the
w Stratagy
voice
board
code
and
activation
Stratagy
System
Configuration
option
of the Stratagy
key-number.
Configuration
Utility to define whether
the log is active
(not
commented
out)
and
its filename.
See
the
n
p rocedures
for removing
and replacing
Stratagy
Installation
section, Chapter 5, "Configuring
and Backing
system hardware components.
Up Stratagy" for details.
1-2

Advertisement

Table of Contents
loading

This manual is also suitable for:

Stratagy 6Stratagy 24

Table of Contents