- About this Guide
- Ultra Services Platform Overview
- Introduction to UGP
- System Operation and Configuration
- Getting Started
- System Settings
- Config Mode Lock Mechanisms
- Management Settings
- Verifying and Saving Your Configuration
- System Interfaces and Ports
- System Security
- Secure System Configuration File
- Software Management Operations
- Smart Licensing
- Monitoring the System
- Bulk Statistics
- System Logs
- Troubleshooting
- Packet Capture (PCAP) Trace
- System Recovery
- Access Control Lists
- Congestion Control
- Routing
- VLANs
- BGP MPLS VPNs
- Content Service Steering
- Session Recovery
- Interchassis Session Recovery
- Support Data Collector
- Engineering Rules
- StarOS Tasks
- NETCONF and ConfD
- ICSR Checkpointing
- UGP SDR CLI Command Strings
- VPC Commands
- KPI Descriptions
- Feature Summary and Revision History
- System Log Types
- Configuring EventLogging Parameters
- Configuring Active Logs
- Specifying Facilities
- Configuring Trace Logging
- Configuring MonitorLogs
- Viewing Logging Configuration and Statistics
- Viewing Event Logs Using the CLI
- Configuring andViewing Crash Logs
- Reducing Excessive Event Logging
- Checkpointing Logs
- Saving Log Files
- Event ID Overview
System Logs
This chapter describes how to configure parameters related to the various types of logging and how to viewing their content. It includes the following sections:
- Feature Summary and Revision History
- System Log Types
- Configuring Event Logging Parameters
- Configuring Active Logs
- Specifying Facilities
- Configuring Trace Logging
- Configuring Monitor Logs
- Viewing Logging Configuration and Statistics
- Viewing Event Logs Using the CLI
- Configuring and Viewing Crash Logs
- Reducing Excessive Event Logging
- Checkpointing Logs
- Saving Log Files
- Event ID Overview
Feature Summary and Revision History
Summary Data
Revision History
Note | Revision history details are not provided for features introduced before releases 21.2 and N5.5. |
Revision Details |
Release |
---|---|
Two new critical CLI event logs and two new SNMP Traps are added to provide notifcation if an administrator disables logging entirely for an Event ID or Event ID range, or changes the logging level below default logging level (error level). These event logs and traps are enabled by default in this release, and cannot be disabled. Refer to Global Configuration Mode Filtering for more information. No commands have been added or modified as a result of this feature. The show snmp trap statistics command output was expanded to show details in the event that logging events have been disabled or logging level has been changed below the default (error) logging level. |
21.3 |
First introduced. |
Pre 21.2 |
System Log Types
There are five types of logs that can be configured and viewed on the system:
Not all Event Logs can be configured on all products. Configurability depends on the hardware platform and licenses in use.
-
Event: Event logging can be used to determine system status and capture important information pertaining to protocols and tasks in use by the system. This is a global function that will be applied to all contexts, sessions, and processes.
-
Active: Active logs are operator configurable on a CLI instance-by-CLI instance basis. Active logs configured by an administrative user in one CLI instance cannot be viewed by an administrative user in a different CLI instance. Each active log can be configured with filter and display properties that are independent of those configured globally for the system. Active logs are displayed in real time as events are generated.
-
Trace: Trace logging can be used to quickly isolate issues that may arise for a particular connected subscriber session. Traces can be taken for a specific call identification (callid) number, IP address, mobile station identification (MSID) number, or username.
-
Monitor: Monitor logging records all activity associated with a particular session. This functionality is available in order to comply with law enforcement agency requirements for monitoring capabilities of particular subscribers. Monitors can be performed based on a subscriber's MSID or username.
-
Crash: Crash logging stores useful information pertaining to system software crashes. This information is useful in determining the cause of the crash.
Configuring Event Logging Parameters
The system can be configured to generate logs based on user-defined filters. The filters specify the facilities (system tasks or protocols) that the system is to monitor and severity levels at which to trigger the generation of the event entries.
Event logs are stored in system memory and can be viewed via the CLI. There are two memory buffers that store event logging information. The first buffer stores the active log information. The second buffer stores inactive logging information. The inactive buffer is used as a temporary repository to allow you to view logs without having data be overwritten. Logs are copied to the inactive buffer only through manual intervention.
Each buffer can store up to 50,000 events. Once these buffers reach their capacity, the oldest information is removed to make room for the newest.
To prevent the loss of log data, the system can be configured to transmit logs to a syslog server over a network interface.
For releases after 15.0 MR4, TACACS+ accounting (CLI event logging) will not be generated for Lawful Intercept users (priv-level 15 and 13).
Configuring Event Log Filters
You can filter the contents of event logs at the Exec mode and Global Configuration mode levels. For additional information, see the Command Line Interface Reference.
Exec Mode Filtering
These commands allow you to limit the amount of data contained in logs without changing global logging parameters.
Follow the examples below to filter logs via Exec mode commands.
Active Filtering
logging active [ copy runtime filters ] [ event-verbosity event_level ] [ pdu-data format ] [ pdu-verbosity pdu_level ]
Notes:
-
copy runtime filters – Copies the runtime filters and uses that copy to filter the current logging session.
-
event-verbosity event_level – Specifies the level of verboseness to use in logging of events as one of: -
min – Displays minimal information about the event. Information includes event name, facility, event ID, severity level, date, and time.
-
concise – Displays detailed information about the event, but does not provide the event source within the system.
-
full – Displays detailed information about event, including source information, identifying where within the system the event was generated.
-
-
pdu-data format – Specifies output format for packet data units when logged as one of: -
pdu-verbosity pdu_level – Specifies the level of verboseness to use in logging of packet data units as an integer from 1 through 5, where 5 is the most detailed.
Save the configuration as described in the Verifying and Saving Your Configuration chapter.
Disable or Enable Filtering by Instance(s)
logging filter active facility facility level severity_level [ critical-info | no-critical-info ]
logging filter { disable | enable } facility facility { all | instance instance_number }
Notes:
-
active – Indicates that only active processes are to have logging options set.
-
disable – Disables logging for a specific instance or all instances. This keyword is only supported for aaamgr, hamgr and sessmgr facilities.
-
enable – Enables logging for a specific instance or all instances. This keyword is only supported for aaamgr, hamgr and sessmgr facilities. By default logging is enabled for all instances of aaamgr, hamgr and sessmgr.
-
facility facility and level severity_level – Configure the logging filter that determines which system facilities should be logged and at what levels. For detailed information, see Specifying Facilities and Event Severities.
-
all | instance instance_number – Specifies whether logging will be disabled or enabled for all instances or a specific instance of aaamgr, hamgr or sessmgr. Run the show session subsystem facility facility command to identify specific instance numbers.
Note
These keywords are only supported with the disable and enable keywords.
-
level severity_level – Specifies the level of information to be logged from the following list which is ordered from highest to lowest: -
critical - display critical events
-
error - display error events and all events with a higher severity level
-
warning - display warning events and all events with a higher severity level
-
unusual - display unusual events and all events with a higher severity level
-
info - display info events and all events with a higher severity level
-
trace - display trace events and all events with a higher severity level
-
debug - display all events
Note
This keyword is only supported in conjunction with the active keyword.
-
-
critical-info – Specifies that events with a category attribute of critical information are to be displayed. Examples of these types of events can be seen at bootup when system processes and tasks are being initiated. This is the default setting.
no-critical-info – Specifies that events with a category attribute of critical information are not to be displayed.
Note
These keywords are only supported in conjunction with the active keyword.
To enable logging of a single instance of a facility, you must first disable all instances of the facility (logging filter disable facility facility all) and then enable logging of the specific instance (logging filter enable facility facility instance instance_number. To restore default behavior you must re-enable logging of all instances (logging filter enable facility facility all).
You can display the instance numbers for enabled instances per facility using the Exec mode show instance-logging command.
Global Configuration Mode Filtering
You can filter the contents of event logs at the Exec mode and Global Configuration mode levels.
Follow the example below to configure run time event logging parameters for the system:
configure logging filter runtime facility facility level report_level logging display { event-verbosity | pdu-data | pdu-verbosity } end
Notes:
-
facility facility and level severity_level – Configure the logging filter that determines which system facilities should be logged and at what levels. For detailed information, see Specifying Facilities and Event Severities.
-
Repeat for every facility that you would like to log.
-
Optional: Configure event ID restrictions by adding the logging disable eventid command. The system provides the ability to restrict the sending of a specific event ID or a range of event IDs to minimize the amount of data logged to that which is most useful. Repeat to disable logging for additional event IDs or event ID ranges.
-
If an administrator restricts event logging for an Event ID or Event ID range using the above command (logging disable eventid ), the system will generate a Critical Event log "cli 30999 critical" as well as an SNMP trap "1361 (DisabledEventIDs)" with the specific Event IDs or Event ID range that was disabled.
These event logs and traps are enabled by default in this release, and cannot be disabled.
-
If an administrator lowers the logging level (using the logging filter runtime facility facility level report_level command below the default level of "error", the system will generate a Critical Event log "cli 30998 critical" as well as an SNMP trap "1362 (LogLevelChanged)" with the specific Event IDs or Event ID range that was disabled.
These event logs and traps are enabled by default in this release, and cannot be disabled.
[local]host# show snmp trap statistics SNMP Notification Statistics: ... Trap Name #Gen #Disc Disable Last Generated ----------------------------------- ----- ----- ------- -------------------- … DisabledEventIDs 1 0 0 2017:05:11:15:35:25 LogLevelChanged 2 0 0 2017:05:11:15:28:03
[local]host# show snmp trap history There are x historical trap records (5000 maximum) Timestamp Trap Information ------------------------ ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- … Thu May 11 15:28:03 2017 Internal trap notification 1362 (LogLevelChanged) Logging level of facility resmgr is changed to critical by user #initial-config# context local privilege level Security Administrator ttyname /dev/pts/0 address type IPV4 remote ip address 0.0.0.0 … Thu May 11 15:35:25 2017 Internal trap notification 1361 (DisabledEventIDs) Event IDs from 100 to 1000 have been disabled by user adminuser context context privilege level security administrator ttyname tty address type IPV4 remote ip address 1.2.3.4 … Mon May 15 10:14:56 2017 Internal trap notification 1362 (LogLevelChanged) Logging level of facility sitmain is changed to critical by user staradmin context local privilege level Security Administrator ttyname /dev/pts/1 address type IPV4 remote ip address 161.44.190.27
Save the configuration as described in the Verifying and Saving Your Configuration chapter.
Configuring syslog Servers
Information generated by the run time event logging filters can be transmitted to a syslog server for permanent storage.
The data transmitted to the syslog server is meant to be used for informational purposes. Functions such as billing and performance monitoring should not be based on syslogs.
Although the system provides the flexibility to configure syslog servers on a context-by-context basis, it is recommended that all servers be configured in the local context in order to isolate the log traffic from the network traffic.
Use the following example to configure syslog servers:
configure context local logging syslog ip_address end
Notes:
- ip_address specifies the IP address of a system log server on the network in IPv4 dotted-decimal or IPv6 colon-separated-hexadecimal notation.
- A number of keyword options/variables are available for the logging syslog command. Refer to the Context Configuration Mode Commands chapter in the Command Line Interface Reference for more information.
- Repeat as needed to configure additional syslog servers. There is no limit to the number of syslog servers that can be configured.
Save the configuration as described in the Verifying and Saving Your Configuration chapter.
Configuring Active Logs
Active logs are event logs that are operator configurable on a CLI instance-by-CLI instance basis. Active logs configured by an administrative user in one CLI instance are not displayed to an administrative user in a different CLI instance. Each active log can be configured with filter and display properties that are independent of those configured globally for the system. Active logs are displayed in real time as they are generated.
Active logs are not written to the active memory buffer by default. To write active logs to the active memory buffer execute the following command in the Global Configuration mode:
[local]host_name(config)# logging runtime buffer store all-events
When active logs are written to the active memory buffer, they are available to all users in all CLI instances.
Use the following example to configure active logging in Global Configuration mode:
[local]host_name(config)# logging filter runtime facility facility level report_level
- Configure the logging filter that determines which system facilities should be logged and at what levels. For detailed information, see Specifying Facilities and Event Severities.
- Repeat for every facility that you would like to log.
- Optional: Configure event ID restrictions by adding the logging disable eventid command. The system provides the ability to restrict the sending of a specific event ID or a range of event IDs to minimize the amount of data logged to that which is most useful. Repeat to disable logging for additional event IDs or event ID ranges.
- A number of keyword options/variables are available for the Exec mode logging active command. Refer to the Exec Mode Commands chapter in the Command Line Interface Reference for more information.
Once all of the necessary information has been gathered, the Active log display can be stopped by entering the following command in the Exec mode:
no logging active
Specifying Facilities
The following facilities can be configured for logging event data:
-
a10: A10 interface facility
-
a11: A11 interface facility
-
a11mgr: A11 Manager facility
-
aaa-client: Authentication, Authorization and Accounting (AAA) client facility
-
aaamgr: AAA manager logging facility
-
aaaproxy: AAA Proxy facility
-
aal2: ATM Adaptation Layer 2 (AAL2) protocol logging facility
-
acl-log: Access Control List (ACL) logging facility
-
acsctrl: Active Charging Service (ACS) Controller facility
-
acsmgr: ACS Manager facility
-
afctrl: Fabric Controller facility [ASR 5500 only]
-
afmgr: Fabric Manager logging facility [ASR 5500 only]
-
alarmctrl: Alarm Controller facility
-
alcap: Access Link Control Application Part (ALCAP) protocol logging facility
-
alcapmgr: ALCAP manager logging facility
-
all: All facilities
-
bfd: Bidirectional Forwarding Detection (BFD) protocol logging facility
-
bgp: Border Gateway Protocol (BGP) facility
-
bindmux: IPCF BindMux-Demux Manager logging facility
-
bngmgr: Broadband Network Gateway (BNG) Demux Manager logging facility
-
bssap+: Base Station Sub-system Application Part+ protocol facility for the login interface between the SGSN and the MSC/VLR (2.5G and 3G)
-
bssgp: Base Station Sub-system GPRS Protocol logging facility handles exchange information between the SGSN and the BSS (2.5G only)
-
callhome: Call Home application logging facility
-
cap: CAMEL Application Part (CAP) logging facility for protocol used in prepaid applications (2.5G and 3G)
-
cbsmgr: Cell Broadcasting Service (CBS) logging facility [HNBGW]
-
cdf: Charging Data Function (CDF) logging facility
-
cgw: Converged Access Gateway (CGW) logging facility
-
cli: Command Line Interface (CLI) logging facility
-
cmp: Certificate Management Protocol (IPSec) logging facility
-
confdmgr: ConfD Manager proclet (NETCONF) logging facility
-
connectedapps: SecGW ASR 9000 oneP communication procotol
-
connproxy: Controller Proxy logging facility
-
credit-control: Credit Control (CC) facility
-
csp: Card/Slot/Port controller facility
-
css: Content Service Selection (CSS) facility
-
css-sig: CSS RADIUS Signaling facility
-
data-mgr: Data Manager Framework logging facility
-
dcardctrl: IPSec Daughter Card Controller logging facility
-
dcardmgr: IPSec Daughter Card Manager logging facility
-
demuxmgr: Demux Manager API facility
-
dgmbmgr: Diameter Gmb Application Manager logging facility
-
dhcp: Dynamic Host Configuration Protocol (DHCP) logging facility
-
dhcpv6: DHCPv6
-
dhost: Distributed Host logging facility
-
diabase: Diabase messages facility
-
diactrl: Diameter Controller proclet logging facility
-
diameter: Diameter endpoint logging facility
-
diameter-acct: Diameter Accounting
-
diameter-auth: Diameter Authentication
-
diameter-dns: Diameter DNS subsystem
-
diameter-ecs: ACS Diameter signaling facility
-
diameter-engine: Diameter version2 engine logging facility
-
diameter-hdd: Diameter Horizontal Directional Drilling (HDD) Interface facility
-
diameter-svc: Diameter Service
-
diamproxy: DiamProxy logging facility
-
dpath: IPSec Data Path logging facility
-
drvctrl: Driver Controller logging facility
-
eap-diameter: Extensible Authentication Protocol (EAP) IP Sec urity facility
-
eap-ipsec: Extensible Authentication Protocol (EAP) IPSec facility
-
eap-sta-s6a-s13-s6b-diameter: EAP/STA/S6A/S13/S6B Diameter messages facility
-
ecs-css: ACSMGR <-> Session Manager Signalling Interface facility
-
egtpc: eGTP-C logging facility
-
egtpmgr: enhanced GPRS Tunneling Protocol (eGTP) manager logging facility
-
egtpu: eGTP-U logging facility
-
embms: evolved Multimedia Broadcast Multicast Services Gateway facility
-
embms: eMBMS Gateway Demux facility
-
epdg: evolved Packet Data (ePDG) gateway logging facility
-
event-notif: Event Notification Interface logging facility
-
evlog: Event log facility
-
famgr: Foreign Agent manager logging facility
-
firewall: Firewall logging facility
-
fng: Femto Network Gateway (FNG) logging facility
-
gbmgr: SGSN Gb Interface Manager facility
-
gmm:
-
For 2.5G: Logs the GPRS Mobility Management (GMM) layer (above LLC layer)
-
For 3G: Logs the access application layer (above the RANAP layer)
-
-
gprs-app: GPRS Application logging facility
-
gprs-ns: GPRS Network Service Protocol (layer between SGSN and the BSS) logging facility
-
gq-rx-tx-diameter: Gq/Rx/Tx Diameter messages facility
-
gss-gcdr: GTPP Storage Server GCDR facility
-
gtpc: GTP-C protocol logging facility
-
gtpcmgr: GTP-C protocol manager logging facility
-
gtpp: GTP-prime protocol logging facility
-
gtpu: GTP-U protocol logging facility
-
gtpumgr: GTP-U Demux manager
-
gx-ty-diameter: Gx/Ty Diameter messages facility
-
gy-diameter: Gy Diameter messages facility
-
h248prt: H.248 port manager facility
-
hamgr: Home Agent manager logging facility
-
hat: High Availability Task (HAT) process facility
-
hdctrl: HD Controller logging facility
-
henbapp: Home Evolved NodeB (HENB) App facility (Do not use this keyword for HENB-GW in Release 20)
-
henbgw: HENB-GW facility (Do not use this keyword for HENB-GW in Release 20)
-
henbgw-pws: HENB-GW Public Warning System logging facility (Do not use this keyword for HENB-GW in Release 20)
-
henbgw-sctp-acs: HENB-GW access Stream Control Transmission Protocol (SCTP) facility (Do not use this keyword for HENB-GW in Release 20)
-
henbgw-sctp-nw: HENBGW network SCTP facility (Do not use this keyword for HNB-GW in Release 20)
-
henbgwdemux: HENB-GW Demux facility (Do not use this keyword for HNB-GW in Release 20)
-
henbgwmgr: HENB-GW Manager facility (Do not use this keyword for HNB-GW in Release 20)
-
hnb-gw: HNB-GW (3G Femto GW) logging facility (Do not use this keyword for HNB-GW in Release 20)
-
hnbmgr: HNB-GW Demux Manager logging facility (Do not use this keyword for HNB-GW in Release 20)
-
hss-peer-service: Home Subscriber Server (HSS) Peer Service facility
-
igmp: Internet Group Management Protocol (IGMP)
-
ikev2: Internet Key Exchange version 2 (IKEv2)
-
ims-authorizatn: IP Multimedia Subsystem (IMS) Authorization Service facility
-
ims-sh: HSS Diameter Sh Interface Service facility
-
imsimgr: SGSN IMSI Manager facility
-
imsue: IMS User Equipment (IMSUE) facility
-
ip-arp: IP Address Resolution Protocol facility
-
ip-interface: IP interface facility
-
ip-route: IP route facility
-
ipms: Intelligent Packet Monitoring System (IPMS) logging facility
-
ipne: IP Network Enabler (IPNE) facility
-
ipsec: IP Security logging facility
-
ipsecdemux: IPSec demux logging facility
-
ipsg: IP Service Gateway interface logging facility
-
ipsgmgr: IP Services Gateway facility
-
ipsp: IP Pool Sharing Protocol logging facility
-
kvstore: Key/Value Store (KVSTORE) Store facility
-
l2tp-control: Layer 2 Tunneling Protocol (L2TP) control logging facility
-
l2tp-data: L2TP data logging facility
-
l2tpdemux: L2TP Demux Manager logging facility
-
l2tpmgr: L2TP Manager logging facility
-
lagmgr: Link Aggregation Group (LAG) manager logging facility
-
lcs: Location Services (LCS) logging facility
-
ldap: Lightweight Directory Access Protocol (LDAP) messages logging facility
-
li: Refer to the Lawful Intercept Configuration Guide for a description of this command.
-
linkmgr: SGSN/BSS SS7 Link Manager logging facility (2.5G only)
-
llc: Logical Link Control (LLC) Protocol logging facility; for SGSN: logs the LLC layer between the GMM and the BSSGP layers for logical links between the MS and the SGSN
-
local-policy: Local Policy Service facility
-
location-service: Location Services facility
-
m3ap: M3 Application Protocol facility
-
m3ua: M3UA Protocol logging facility
-
magmgr: Mobile Access Gateway manager logging facility
-
map: Mobile Application Part (MAP) protocol logging facility
-
megadiammgr: MegaDiameter Manager (SLF Service) logging facility
-
mme-app: Mobility Management Entity (MME) Application logging facility
-
mme-embms: MME evolved Multimedia Broadcast Multicast Service facility
-
mme-misc: MME miscellaneous logging facility
-
mmedemux: MME Demux Manager logging facility
-
mmemgr: MME Manager facility
-
mmgr: Master Manager logging facility
-
mobile-ip: Mobile IP processes
-
mobile-ip-data: Mobile IP data facility
-
mobile-ipv6: Mobile IPv6 logging facility
-
mpls: Multiprotocol Label Switching (MPLS) protocol logging facility
-
mrme: Multi Radio Mobility Entity (MRME) logging facility
-
mseg-app: Mobile Services Edge Gateway (MSEG) application logging facility (This option is not supported in this release.)
-
mseg-gtpc: MSEG GTP-C application logging facility (This option is not supported in this release.)
-
mseg-gtpu: MSEG GTP-U application logging facility (This option is not supported in this release.)
-
msegmgr: MSEG Demux Manager logging facility (This option is not supported in this release.)
-
mtp2: Message Transfer Part 2 (MTP2) Service logging facility
-
mtp3: Message Transfer Part 3 (MTP3) Protocol logging facility
-
multicast-proxy: Multicast Proxy logging facility
-
nas: Non-Access Stratum (NAS) protocol logging facility [MME 4G]
-
netwstrg: Network Storage facility
-
npuctrl: Network Processor Unit Control facility
-
npumgr: Network Processor Unit Manager facility
-
npumgr-acl: NPUMGR ACL logging facility
-
npumgr-drv: NPUMGR DRV logging facility
-
npumgr-flow: NPUMGR FLOW logging facility
-
npumgr-fwd: NPUMGR FWD logging facility
-
npumgr-init: NPUMGR INIT logging facility
-
npumgr-lc: NPUMGR LC logging facility
-
npumgr-port: NPUMGR PORT logging facility
-
npumgr-recovery: NPUMGR RECOVERY logging facility
-
npumgr-rri: NPUMGR RRI (Reverse Route Injection) logging facility
-
npumgr-vpn: NPUMGR VPN logging facility
-
ntfy-intf: Notification Interface logging facility [Release 12.0 and earlier versions only]
-
ocsp: Online Certificate Status Protocol logging facility.
-
orbs: Object Request Broker System logging facility
-
ospf: OSPF protocol logging facility
-
ospfv3: OSPFv3 protocol logging facility
-
p2p: Peer-to-Peer Detection logging facility
-
pagingmgr: PAGINGMGR logging facility
-
pccmgr: Intelligent Policy Control Function (IPCF) Policy Charging and Control (PCC) Manager library
-
pdg: Packet Data Gateway (PDG) logging facility
-
pdgdmgr: PDG Demux Manager logging facility
-
pdif: Packet Data Interworking Function (PDIF) logging facility
-
pgw: Packet Data Network Gateway (PGW) logging facility
-
pmm-app: Packet Mobility Management (PMM) application logging facility
-
ppp: Point-To-Point Protocol (PPP) link and packet facilities
-
pppoe: PPP over Ethernet logging facility
-
proclet-map-frwk: Proclet mapping framework logging facility
-
push: VPNMGR CDR push logging facility
-
radius-acct: RADIUS accounting logging facility
-
radius-auth: RADIUS authentication logging facility
-
radius-coa: RADIUS change of authorization and radius disconnect
-
ranap: Radio Access Network Application Part (RANAP) Protocol facility logging info flow between SGSN and RNS (3G)
-
rct: Recovery Control Task logging facility
-
rdt: Redirect Task logging facility
-
resmgr: Resource Manager logging facility
-
rf-diameter: Diameter Rf interface messages facility
-
rip: Routing Information Protocol (RIP) logging facility [RIP is not supported at this time.]
-
rlf: Rate Limiting Function (RLF) logging facility
-
rohc: Robust Header Compression (RoHC) facility
-
rsvp: Reservation Protocol logging facility
-
rua: RANAP User Adaptation (RUA) [3G Femto GW - RUA messages] logging facility
-
s102: S102 protocol logging facility
-
s102mgr: S102Mgr logging facility
-
s1ap: S1 Application Protocol (S1AP) Protocol logging facility
-
sabp: Service Area Broadcast Protocol (SABP) logging facility
-
saegw: System Architecture Evolution (SAE) Gateway facility
-
sbc: SBc protocol logging facility
-
sccp: Signalling Connection Control Part (SCCP) Protocol logging (connection-oriented messages between RANAP and TCAP layers).
-
sct: Shared Configuration Task logging facility
-
sctp: Stream Control Transmission Protocol (SCTP) Protocol logging facility
-
sef_ecs: Severely Errored Frames (SEF) APIs printing facility
-
sess-gr: SM GR facility
-
sessctrl: Session Controller logging facility
-
sessmgr: Session Manager logging facility
-
sesstrc: session trace logging facility
-
sft: Switch Fabric Task logging facility
-
sgs: SGs interface protocol logging facility
-
sgsn-app: SGSN-APP logging various SGSN "glue" interfaces (for example, between PMM, MAP, GPRS-FSM, SMS).
-
sgsn-failures: SGSN call failures (attach/activate rejects) logging facility (2.5G)
-
sgsn-gtpc: SGSN GTP-C Protocol logging control messages between the SGSN and the GGSN
-
sgsn-gtpu: SGSN GTP-U Protocol logging user data messages between the SGSN and GGSN
-
sgsn-mbms-bearer: SGSN Multimedia Broadcast/Multicast Service (MBMS) Bearer app (SMGR) logging facility
-
sgsn-misc: Used by stack manager to log binding and removing between layers
-
sgsn-system: SGSN System Components logging facility (used infrequently)
-
sgsn-test: SGSN Tests logging facility; used infrequently
-
sgtpcmgr: SGSN GTP-C Manager logging information exchange through SGTPC and the GGSN
-
sgw: Serving Gateway facility
-
sh-diameter: Sh Diameter messages facility
-
sitmain: System Initialization Task main logging facility
-
sls: Service Level Specification (SLS) protocol logging facility
-
sm-app: SM Protocol logging facility
-
sms: Short Message Service (SMS) logging messages between the MS and the SMSC
-
sndcp: Sub Network Dependent Convergence Protocol (SNDCP) logging facility
-
snmp: SNMP logging facility
-
sprmgr: IPCF Subscriber Policy Register (SPR) manager logging facility
-
srdb: Static Rating Database
-
srp: Service Redundancy Protocol (SRP) logging facility
-
sscfnni: Service-Specific Coordination Function for Signaling at the Network Node Interface (SSCF-NNI) logging facility
-
sscop: Service-Specific Connection-Oriented Protocol (SSCOP) logging facility
-
ssh-ipsec: Secure Shell (SSH) IP Security logging facility
-
ssl: Secure Socket Layer (SSL) message logging facility
-
stat: Statistics logging facility
-
supserv: Supplementary Services logging facility [H.323]
-
system: System logging facility
-
tacacsplus: TACACS+ Protocol logging facility
-
tcap: TCAP Protocol logging facility
-
testctrl: Test Controller logging facility
-
testmgr: Test Manager logging facility
-
threshold: threshold logging facility
-
ttg: Tunnel Termination Gateway (TTG) logging facility
-
tucl: TCP/UDP Convergence Layer (TUCL) logging facility
-
udr: User Data Record (UDR) facility (used with the Charging Service)
-
user-data: User data logging facility
-
user-l3tunnel: User Layer 3 tunnel logging facility
-
usertcp-stack: User TCP Stack
-
vim: Voice Instant Messaging (VIM) logging facility
-
vinfo: VINFO logging facility
-
vmgctrl: Virtual Media Gateway (VMG) controller facility
-
vmgctrl: VMG Content Manager facility
-
vpn: Virtual Private Network logging facility
-
wimax-data: WiMAX DATA
-
wimax-r6: WiMAX R6
-
wsg: Wireless Security Gateway (ASR 9000 Security Gateway)
-
x2gw-app: X2GW (X2 proxy Gateway, eNodeB) application logging facility
-
x2gw-demux: X2GW demux task logging facility
Configuring Trace Logging
Trace logging is useful for quickly resolving issues for specific sessions that are currently active. They are temporary filters that are generated based on a qualifier that is independent of the global event log filter configured using the logging filter command in the Exec mode. Like event logs, however, the information generated by the logs is stored in the active memory buffer.
All debug level events associated with the selected call are stored.
Trace logs impact session processing. They should be implemented for debug purposes only.
Use the following example to configure trace logs in the Exec mode:
[local]host_name# logging trace { callid call_id | ipaddr ip_address | msid ms_id | username username }
Once all of the necessary information has been gathered, the trace log can be deleted by entering the following command:
[local]host_name# no logging trace { callid call_id | ipaddr ip_address | msid ms_id | username username }
Configuring Monitor Logs
Monitor logging records all activity associated with all of a particular subscriber's sessions. This functionality is available in compliance with law enforcement agency requirements for monitoring capabilities of particular subscribers.
Monitors can be performed based on a subscriber's MSID or username, and are only intended to be used for finite periods of time as dictated by the law enforcement agency. Therefore, they should be terminated immediately after the required monitoring period.
This section provides instructions for enabling and disabling monitor logs.
Enabling Monitor Logs
Use the following example to configure monitor log targets:
configure logging monitor { ip_addr | ipv6_addr | msid id | username name } end
Repeat to configure additional monitor log targets.
Disabling Monitor Logs
Use the following example to disable monitor logs:
configure no logging monitor { ip_addr | ipv6_addr | msid id | username name } end
Viewing Logging Configuration and Statistics
Logging configuration and statistics can be verified by entering the following command from the Exec mode:
[local]host_name# show logging [ active | verbose ]
When no keyword is specified, the global filter configuration is displayed as well as information about any other type of logging that is enabled.
The following table provides information] and descriptions of the statistics that are displayed when the verbose keyword is used.
Field | Description |
---|---|
General Logging Statistics | |
Total events received | Displays the total number of events generated by the system. |
Number of applications receiving events | Displays the number of applications receiving the events. |
Logging Source Statistics | |
Event sequence ids by process | Displays a list of system processes that have generated events and the reference identification number of the event that was generated. |
Msg backlog stat with total cnt | Displays the number of event messages that have been back logged in comparison to the total number of events generated. |
LS L2 filter drop rate | Displays the percentage of logging source (LS) layer 2 (L2) event drops. |
Abnormal Log Source Statistics | Displays abnormal logging source (LS) statistics, if any. |
Runtime Logging Buffer Statistics | |
Active buffer | Displays the number of events currently logged in the active memory buffer as well as a date/time timestamp for the oldest and most recent entries in the buffer. |
Inactive buffer | Displays the number of events currently logged in the inactive memory buffer. |
Viewing Event Logs Using the CLI
Event logs generated by the system can be viewed in one of the following ways:
-
From the syslog server: If the system is configured to send logs to a syslog server, the logs can be viewed directly on the syslog server.
-
From the system CLI: Logs stored in the system memory buffers can be viewed directly from the CLI.
-
From the console port: By default, the system automatically displays events over the console interface to a terminal provided that there is no CLI session active.
This section provides instructions for viewing event logs using the CLI. These instructions assume that you are at the root prompt for the Exec mode.
Configuring and Viewing Crash Logs
In the unlikely even of a software crash, the system stores information that could be useful in determining the reason for the crash. This information can be maintained in system memory or it can be transferred and stored on a network server.
The system supports the generation of the following two types of logs:
Crash log: Crash logs record all possible information pertaining to a software crash (full core dump). Due to their size, they can not be stored in system memory. Therefore, these logs are only generated if the system is configured with a Universal Resource Locator (URL) pointing to a local device or a network server where the log can be stored.
Abridged crash log: Crash event records are automatically generated when a software crash occurs and are stored in flash memory on management cards. The abridged crash log contains a list crash event records along with associated dump files. This log allows you to view event records and dump files via CLI commands.
- Crash Logging Architecture
- Configuring Software Crash Log Destinations
- Viewing Abridged Crash Log Information Using the CLI
Crash Logging Architecture
The crash log is a persistent repository of crash event information. Each event is numbered and contains text associated with a CPU (minicore), NPU or kernel crash. The logged events are recorded into fixed length records and stored in /flash/crashlog2.
The crashlog2 file along with associated minicore, NPU and kernel dumps are automatically synchronized across redundant management cards (SMC, MIO/UMIO). Full core dumps are not synchronized across management cards.
-
When a crash event arrives on an active management card, the event record is stored in its crashlog2 file along with the minicore, NPU, or kernel dump file in /flash/crsh2. The crash event and dump file are also automatically stored in the same locations on the standby management card.
-
When a crash log entry is deleted via CLI command, it is deleted on both the active and standby management cards.
-
When a management card is added or replaced, active and standby cards will automatically synchronize crash logs and dump files.
-
When a crash event is received and the crash log file is full, the oldest entry in the crash log and its related dump file will be replaced with the latest arrived event and dump file on both management cards. Information for a maximum of 120 crash events can be stored on management cards.
-
Duplicate crash events bump the count of hits in the existing record and update the new record with the old crash record. Additions to the count use the timestamp for the first time the event happened.
Configuring Software Crash Log Destinations
The system can be configured to store software crash log information to any of the following locations:
- On the ASR 5500:
-
Flash memory: Installed on the active MIO/UMIO [abridged crash log and associated dump files only]
-
USB memory stick: Installed in the USB slot on the active MIO/UMIO
-
- On VPC
-
Flash memory: Accessible by the virtual machine
-
USB memory stick: Installed in the USB slot of the platform (USB slot has been enabled via the hypervisor)
-
-
Network Server: Any workstation or server on the network that the system can access using the Trivial File Transfer Protocol (TFTP), the File Transfer Protocol (FTP), the Secure File Transfer Protocol (SFTP), or the Hyper-Text Transfer Protocol (HTTP); this is recommended for large network deployments in which multiple systems require the same configuration
In release 20.0 and higher Trusted StarOS builds, FTP is not supported.
Crash log files (full core dumps) are written with unique names as they occur to the specified location. The name format is crash-card-cpu-time-core. Where card is the card slot, cpu is the number of the CPU on the card, and time is the Portable Operating System Interface (POSIX) timestamp in hexadecimal notation.
Use the following example to configure a software crash log destination in the Global Configuration mode:
configure crash enable [ encrypted ] url crash_url end
- Refer to the Global Configuration Mode Commands chapter in the Command Line Interface Reference for more information on this command.
- Repeat to configure additional software crash log destinations. There is no limit to the number of destinations that can be configured.
Save the configuration as described in the Verifying and Saving Your Configuration chapter.
Viewing Abridged Crash Log Information Using the CLI
You can view abridged crash information that is stored as a set of event records in flash memory on management cards (/flash/crashlog2). Each crash event record has an associated dump file (minicore, NPU or kernel) that can also be displayed (/flash/crsh2)
Follow the instructions in this section to view software crash events that have occurred on the system. These instructions assume that you are at the root prompt for the Exec mode.
Reducing Excessive Event Logging
Event logging (evlogd) is a shared medium that captures event messages sent by StarOS facilities. When one or more facilities continuously and overwhelmingly keep sending a high volume of event messages, the remaining non-offender facilities are impacted. This scenario degrades system performance, especially as the number of facilities generating logs increases.
Rate-control of event message logging is handled in the Log Source path. Essentially, every second a counter is set to zero and is incremented for each log event that is sent to evlogd. If the count reaches a threshold before the second is up, the event is sent, queued or dropped (if the evlogd messenger queue is full).
When any facility exceeds the upper threshold set with this command for the rate of message logging and remains in the same state for prolonged interval, StarOS notifies the user via an SNMP trap or alarm.
A new threshold command allows a user to specify the percentage of facility event queue full. When this threshold is exceeded, an SNMP trap and alarm are generated that specifies the offending facility.
-
ThreshLSLogsVolume <timestamp> Internal trap notification <trap_id> (ThreshLSLogsVolume) threshold <upper_percent>% measured value <actual_percent>% for facility <facility_name> instance <instance_id>
-
ThreshClearLSLogsVolume <timestamp> Internal trap notification <trap_id> (ThreshClearLSLogsVolume) threshold <upper_percent>% measured value <actual_percent>% for facility <facility_name> instance <instance_id>
If a trigger condition occurs within the polling interval, the alert or alarm will not be generated until the end of the polling interval.
Both traps can be enabled or suppressed via the Global Configuration mode snmp trap command.
Configuring Log Source Thresholds
-
threshold ls-logs-volume – sets the parameters for the upper and lower thresholds for generating and clearing traps/alarms respectively.
-
threshold poll ls-logs-volume interval – establishes the polling interval for this threshold.
-
threshold monitoring ls-logs-volume – turns monitoring of this threshold on and off.
Use the following example to configure syslog servers:
configure [ default ] threshold ls-logs-volume upper_percent [ clear lower_percent ] [ default ] threshold poll ls-logs-volume interval duration [ no ] threshold monitoring ls-logs-volume end
-
upper_percent and lower_percent are expressed as integers from 0 to 100. Default value for upper_percent is 90%. If lower_percent is not specified, the default clear value is upper_percent.
-
threshold poll ls-logs-volume interval sets the polling interval in seconds. The default interval is 300 seconds (5 minutes).
-
threshold monitoring ls-logs-volume enables or disables this feature.
You can verify the configuration of this threshold by running the Exec mode show threshold command.
Save the configuration as described in the Verifying and Saving Your Configuration chapter.
Checkpointing Logs
Checkpointing identifies logged data as previously viewed or marked. Checkpointing allows you to only display log information since the last checkpoint.
Individual logs may have up to 50,000 events in the active log. Checkpointing the logs results in at most 50,000 events being in the inactive log files. This gives a maximum of 100,000 events in total which are available for each facility logged.
You check point log data via the Exec mode logs checkpoint command to set the log contents to a well-known point prior to special activities taking place. This command may also be a part of periodic regular maintenance to manage log data.
Checkpointing logs moves the current log data to the inactive logs. Only the most recently check pointed data is retained in the inactive logs. A subsequent check pointing of the logs results in the prior check pointed inactive log data being cleared and replaced with the newly check pointed data. Checkpointed log data is not available for viewing.
Checkpointing logs should be done periodically to prevent the log files becoming full. Logs which have 50,000 events logged will discard the oldest events first as new events are logged.
An Inspector-level administrative user cannot execute this command.
Saving Log Files
Log files can be saved to a file in a local or remote location specified by a URL. Use the following Exec mode command to save log files:
save logs { url } [ active ] ] [ inactive ] [ callid call_id ] [event-verbosity evt_verboseness ] [ facility facility ] [level severity_level ] [ pdu-data pdu_format ] [ pdu-verbosity pdu_verboseness ] [ since from_date_time [ until to_date_time ] ] [ | { grep grep_options | more } ]
For detailed information on the save logs command, see the Exec Mode Commands chapter in the Command Line Interface Reference.
Event ID Overview
The use of event IDs depends on the platform type and the licenses running on the platform.
Facility | Description | Event ID Range |
---|---|---|
a10 | A10 Protocol Facility | 28000-28999 |
a11 | A11 Protocol Facility | 29000-29999 |
a11mgr | A11 Manager Facility | 9000-9999 |
aaa-client | AAA Client Facility | 6000-6999 |
aaamgr | AAA Manager Facility | 36000-36999 |
aaaproxy | AAA Proxy Facility | 64000-64999 |
aal2 | AAL2 Protocol Facility | 173200-173299 |
acl-log | IP Access Control List (ACL) Facility | 21000-21999 |
acsctrl | Active Charging Service Controller (ACSCtrl) Facility | 90000-90999 |
acsmgr | Active Charging Service Manager (ACSMgr) Facility | 91000-91999 |
afctrl | Ares Fabric Controller (ASR 5500 only) | 186000-186999 |
afmgr | Ares Fabric Manager (ASR 5500 only) | 187000-187999 |
alarmctrl | Alarm Controller Facility | 65000-65999 |
alcap | Access Link Control Application Part (ALCAP) Protocol Facility | 160900-161399 |
alcapmgr | ALCAP Manager Facility | 160500-160899 |
asf | ASF Facility | 73000-73999 |
asfprt | ASFPRT Facility | 59000-59999 |
asngwmgr | Access Service Network (ASN) Gateway Manager Facility | 100000-100499 |
asnpcmgr | ASN Paging/Location-Registry Manager Facility | 100500-100999 |
bcmcs | Broadcast/Multicast Service (BCMCS) Facility | 109000-109999 |
bfd | Bidirectional Forwarding Detection (BFD) Protocol Facility | 170500-170999 |
bgp | Border Gateway Protocol (BGP) Facility | 85000-85999 |
bindmux | BindMux Manager Facility [Intelligent Policy Control Function (IPCF)] | 158200-158999 |
bngmgr | Broadband Network Gateway (BNG) Manager Facility | 182000-182999 |
bssap | Base Station System Application Part+ (BSSAP+) Service Facilities | 131000-131199 |
bssgp | Base Station System GPRS Protocol (BSSGP) Facility | 115050-115099 |
callhome | Call Home Facility | 173600-173999 |
cap | CAMEL Application Part (CAP) Facility | 87900-88099 |
chatconf | CHATCONF Facility | 74000-74999 |
cli | Command Line Interface (CLI) Facility | 30000-30999 |
connproxy | Connection Proxy Facility | 190000-190999 |
crdt-ctl | Credit Control Facility | 127000-127999 |
csg | Closed Subscriber Groups (CSG) Facility | 188000-188999 |
csg-acl | CSG Access Control List (ACL) Facility | 189000-189999 |
csp | Card/Slot/Port (CSP) Facility | 7000-7999 |
css | Content Steering Service (CSS) Facility [ESC] | 77000-77499 |
css-sig | Content Service Selection (CSS) RADIUS Signaling Facility | 77500-77599 |
cx-diameter | Cx Diameter Message Facility | 92840-92849 |
dcardctrl | Daughter Card Controller Facility | 62000-62999 |
dcardmgr | Daughter Card Manager Facility | 57000-57999 |
demuxmgr | Demux Manager Facility | 110000-110999 |
dgmbmgr | Diameter Gmb (DGMB) Application Manager Facility | 126000-126999 |
dhcp | DHCP Facility | 53000-53999 |
dhcpv6 | DHCPv6 Protocol Facility | 123000-123999 |
dhost | Distributed Host Manager Facility | 83000-83999 |
diameter | Diameter Endpoint Facility | 92000-92599 |
diabase | Diabase Message Facility | 92800-92809 |
diameter-acct | Diameter Accounting Protocol Facility | 112000-112999 |
diameter-auth | Diameter Authentication Protocol Facility | 111000-111999 |
diameter-dns | Diameter DNS Subsystem Facility | 92600-92699 |
diameter-ecs | ECS Diameter Signaling Facility | 81990-81999 |
diameter-hdd | Diameter Horizontal Directional Drilling (HDD) Interface Facility | 92700-92799 |
diameter-svc | Diameter Service Facility | 121200-121999 |
diamproxy | Diameter Proxy Facility | 119000-119999 |
dpath | Data Path for IPSec Facility | 54000-54999 |
drvctrl | Driver Controller Facility | 39000-39999 |
ds3mgr | DS3 and DS3/E Line Card Manager Facility (part of NPU Manager Controller Facility) | 40000-40999 |
eap-diameter | Extensible Authentication Protocol (EAP) Diameter Facility | 92870-92879 |
eap-ipsec | EAP IPSec Facility | 118000-118999 |
ecs-css | ACS Session Manager (ACSMgr) Signalling Interface Facility | 97000-97099 |
edr | Event Data Record (EDR) Facility | 80000-80999 |
egtpc | eGTP-C Facility | 141000-141999 |
egtpmgr | eGTP Manager Facility | 143000-143999 |
egtpu | eGTP-U Facility | 142000-142999 |
epdg | Evolved Packet Data Gateway (ePDG) Facility | 178000-178999 |
evlog | Event Log Facility | 2000-2999 |
famgr | Foreign Agent (FA) Manager Facility | 33000-33999 |
firewall | Firewall Facility | 96000-96999 |
fng | Femto Network Gateway (FNG) Facility | 149000-149999 |
gbrmgr | Gb-Manager Facility | 201900-202699 |
gcdr | GGSN-Charging Data Record (G-CDR) Facility | 66000-66999 |
gmm | GPRS Mobility Management (GMM) Facility | 88100-88299 |
gprs-app | General Packet Radio Service (GPRS) Application Facility | 115100-115399 |
gprs-ns | GPRS-NS Protocol Facility | 115000-115049 |
gq-rx-tx-diameter | Gq/Rx/Tx Diameter Messages Facility | 92830-92839 |
gss-gcdr | GTPP Storage Server GCDR Facility | 98000-98099 |
gtpc | GTPC Protocol Facility | 47000-47999 |
gtpcmgr | GTPC Signaling Demultiplexer Manager Facility | 46000-46999 |
gtpp | GTP-PRIME Protocol Facility | 52000-52999 |
gtpu | GTPU Protocol Facility | 45000-45999 |
gtpumgr | GTPU Manager Facility | 157200-157999 |
gx-ty-diameter | Gx/Ty Diameter Messages Facility | 92820-92829 |
gy-diameter | Gy Diameter Messages Facility | 92810-92819 |
h248prt | H.248 Protocol Facility | 42000-42999 |
hamgr | Home Agent (HA) Manager Facility | 34000-34999 |
hat | High Availability Task (HAT) Facility | 3000-3999 |
hdctrl | Hard Disk (HD) Controller Facility | 132000-132999 |
hddshare | HDD Share Facility | 184000-184999 |
henb-gw | Home eNodeB-GW Facility | 195000-195999 |
henbapp | Home eNodeB Application Facility | 196000-196999 |
henbgwdemux | Home eNodeB-GW Demux Facility | 194000-194999 |
henbgwmgr | Home eNodeB-GW Manager Facility | 193000, 193999 |
hnb-gw | Home NodeB (HNB) Gateway Facility | 151000-151999 |
hnbmgr | HNB Manager Facility | 158000-158199 |
hss-peer-service | Home Subscriber Server (HSS) Facility [MME] | 138000-138999 |
igmp | Internet Group Management Protocol (IGMP) Facility | 113000-113999 |
ikev2 | IKEv2 Facility | 122000-122999 |
ims-authorizatn | IMS Authorization Service Library Facility | 98100-98999 |
ims-sh | IMS SH Library Facility | 124000-124999 |
imsimgr | International Mobile Subscriber Identity (IMSI) Manager Facility | 114000-114999 |
imsue | IMS User Equipment (IMSUE) Facility | 144000-145999 |
ip-arp | IP Address Resolution Protocol (ARP) Facility | 19000-19999 |
ip-interface | IP Interface Facility | 18000-18999 |
ip-route | IP Route Facility | 20000-20999 |
ipms | Intelligent Packet Monitoring System (IPMS) Facility | 134000-134999 |
ipne | IP Network Enabler (IPNE) Facility | 192000-192999 |
ipsec | IPSec Protocol Facility | 55000-56998 |
ipsg | IP Services Gateway (IPSG) Facility | 128000-128999 |
ipsgmgr | IPSG Manager (IPSGMgr) Facility | 99000-99999 |
ipsp | IP Pool Sharing Protocol (IPSP) Facility | 68000-68999 |
kvstore | Key/Value Store (KVSTORE) Facility | 125000-125999 |
l2tp-control | L2TP Control PDU Protocol Facility | 50000-50999 |
l2tp-data | L2TP Data PDU Protocol Facility | 49000-49999 |
l2tpdemux | L2TP Demux Facility | 63000-63999 |
l2tpmgr | L2TP Manager Facility | 48000-48999 |
lagmgr | Link Aggregation Group (LAG) Manager Facility | 179000-179999 |
ldap | Lightweight Directory Access Protocol (LDAP) Request Facility | 160000-160499 |
li | Lawful Intercept (LI) Log Facility | 69000-69999 |
linkmgr | Link Manager Facility | 89500-89999 |
llc | Logical Link-Control (LLC) Layer Facility (GPRS) | 115700-115799 |
local-policy | Local Policy Configuration Facility | 161400-162399 |
m3ap | M3 Application Protocol (M3AP) Facility | 211500-211999 |
m3ua | MTP Level 3 (M3UA) Protocol Facility [SIGTRAN] | 87500-87699 |
magmgr | Mobile Access Gateway (MAG) Manager Facility | 137500-137999 |
map | Mobile Application Part (MAP) Protocol Facility [SS7] | 87100-87299 |
megadiammgr | MegaDiameter Manager Facility | 121000-121199 |
mme-app | Mobility Management Entity (MME) Application Facility | 147000-147999 |
mme-embms | MME evolved Multimedia Broadcast Multicast Service (eMBMS) Facility | 212000-212499 |
mme-misc | MME Miscellaneous Facility | 155800-156199 |
mmedemux | MME Demux Manager Facility | 154000-154999 |
mmemgr | MME Manager Facility | 137000-137499 |
mmgr | Master Manager (MMGR) Facility | 86000-86399 |
mobile-ip | Mobile IP (MIP) Protocol Facility | 26000-26999 |
mobile-ip-data | MIP Tunneled Data Facility | 27000-27999 |
mobile-ipv6 | Mobile IPv6 Facility | 129000-129999 |
mpls | Multiprotocol Label Switching (MPLS) Facility | 163500-163999 |
mseg-app |
Mobile Services Edge Gateway (MSEG) Application Facility Not supported in this release. |
172300-172999 |
mseg-gtpc |
MSEG GTPC Application Facility Not supported in this release. |
172000-172199 |
mseg-gtpu |
MSEG GTPU Application Facility Not supported in this release. |
172200-172299 |
msegmgr |
MSEG Manager Facility Not supported in this release. |
171000-171999 |
mtp2 | Message Transfer Part 2 (MTP2) Service Facility [SS7] | 116900-116999 |
mtp3 | Message Transfer Part 3 (MTP3) Service Facility [SS7] | 115600-115699 |
multicast-proxy | Multicast Proxy Facility | 94000-94999 |
nas | Network Access Signaling (NAS) Facility | 153000-153999 |
netwstrg | Network Storage Facility | 78000-78999 |
npuctrl | Network Processing Unit (NPU) Control Facility | 16000-16999 |
npudrv | NPU Driver Facility | 191000-191999 |
npumgr | NPU Manager (NPUMGR) Facility | 17000-17999 |
npumgr-acl | NPUMGR ACL Facility | 169000-169999 |
npumgr-drv | NPUMGR Driver Facility | 185000-185999 |
npumgr-flow | NPUMGR Flow Facility | 167000-167999 |
npumgr-fwd | NPUMGR Forwarding Facility | 168000-168999 |
npumgr-init | NPUMGR Initialization Facility | 164000-164999 |
npumgr-lc | NPUMGR LC Facility | 180000-180999 |
npumgr-port | NPUMGR Port Facility | 166000-166999 |
npumgr-recovery | NPUMGR Recovery Facility | 165000-165999 |
npumgr-vpn | NPUMGR VPN Facility | 181000-181999 |
npusim | NPUSIM Facility | 176000-176999 |
ntfy-intf | Event Notification Interface Facility | 170000-170499 |
orbs | Object Request Broker (ORB) System Facility | 15000-15999 |
ospf | Open Shortest Path First (OSPF) Protocol Facility | 38000-38999 |
ospfv3 | OSPFv3 Protocol Facility [IPv6] | 150000-150999 |
p2p | Peer-to-Peer (P2P) Facility | 146000-146999 |
pccmgr | Policy Charging and Control (PCC) Manager Facility | 159000-159499 |
pdg | Packet Data Gateway (PDG) Facility | 152010-152999 |
pdgdmgr | PDG TCP Demux Manager (pdgdmgr) Facility (this is a customer-specific facility) | 162400-162999 |
pdif | Packet Data Interworking Function (PDIF) Facility | 120000-120999 |
pgw | Packet Data Network Gateway (PGW) Facility | 139000-139999 |
pmm-app | Packet Mobility Management (PMM) Application Facility [SGSN] | 89200-89499 |
ppp | Point-To-Point Protocol (PPP) Facility | 25000-25999 |
pppoe | Point-to-Point Protocol over Ethernet (PPPoE) Facility | 183000-183999 |
ptt | PTT Facility | 76000-76999 |
push | PUSH (VPNMgr CDR Push) Facility | 133000-133999 |
radius-acct | RADIUS Accounting Protocol Facility | 24000-24999 |
radius-auth | RADIUS Authentication Protocol Facility | 23000-23999 |
radius-coa | RADIUS Change of Authorization (CoA) and Disconnect Facility | 70000-70999 |
ranap | Radio Access Network Application Part (RANAP) Facility | 87700-87899 |
rct | Recovery Control Task (RCT) Facility | 13000-13999 |
rdt | Redirector Task (RDT) Facility | 67000-67999 |
resmgr | Resource Manager (RM) Facility | 14000-14999 |
rf-diameter | Rf Diameter Messages Facility | 92860-92869 |
rip | Routing Information Protocol (RIP) Facility | 35000-35999 |
rohc | Robust Header Compression (ROHC) Protocol Facility | 103000-103999 |
rsvp | RSVP Protocol Facility | 93000-93999 |
rua | RANAP User Adaptation (RUA) Protocol Facility | 152000-152009 |
s1ap | S1 Application Protocol (S1AP) Facility | 155200-155799 |
saegw | System Architecture Evolution Gateway Facility | 191000-191999 |
sccp | Signalling Connection Control Part (SCCP) Protocol Facility [SS7] | 86700-86899 |
sct | Shared Configuration Task (SCT) Facility | 32000-32099 |
sctp | Stream Control Transmission Protocol (SCTP) Protocol Facility | 87300-87499 |
sess-gr | SESS-GR Facility | 77600-77999 |
sessctrl | Session Controller Facility | 8000-8999 |
sessmgr | Session Manager Facility | 10000-12999 |
sesstrc | Session Trace Facility | 155000-155199 |
sft | Switch Fabric Task (SFT) Facility | 58000-58999 |
sgs | SGs Interface Protocol Facility [MME] | 173000-173199 |
sgsn-app | SGSN Application Interface Facility | 115900-115999 |
sgsn-failures | SGSN Call Failures Facility | 89100-89199 |
sgsn-gtpc | SGSN GTP-C Protocol Facility | 116000-116599 |
sgsn-gtpu | SGSN GTP-U Protocol Facility | 86900-87099 |
sgsn-mbms-bearer | SGSN MBMS Bearer Application (SMGR) Facility | 116600-116799 |
sgsn-misc | SGSN Miscellaneous Facility | 88800-89099 |
sgsn-system | SGSN System Components Facility | 86400-86499 |
sgsn-test | SGSN Tests Facility | 88700-88799 |
sgsn2 | SGSN2 Facility | 114000-117999 |
sgtpcmgr | SGSN GTP-C (SGTPC) Manager Facility | 117000-117999 |
sgw | Serving Gateway (SGW) Facility | 140000-140999 |
sh-diameter | Sh Diameter Messages Facility | 92850-92859 |
sipcdprt | SIPCDPRT Facility | 95000-95999 |
sitmain | System Initiation Task (SIT) Main Facility | 4000-4999 |
sm-app | Short Message Service (SMS) Facility | 88300-88499 |
sms | SMS Service Facility | 116800-116899 |
sndcp | Sub Network Dependent Convergence Protocol (SNDCP) Facility | 115800-115899 |
snmp | Simple Network Management Protocol (SNMP) Facility | 22000-22999 |
sprmgr | Subscriber Policy Register (SPR) Manager Facility | 159500-159999 |
srdb | Static Rating Database Facility | 102000-102999 |
srp | Service Redundancy Protocol (SRP) Facility | 84000-84999 |
sscfnni | SSCFNNI Protocol Facility [ATM] | 115500-115599 |
sscop | SSCOP Protocol Facility [ATM] | 115400-115499 |
ssh-ipsec | SSH IP Security Facility | 56999-56999 |
ssl | SSL Facility (this is a customer-specific facility) | 156200-157199 |
stat | Statistics Facility | 31000-31999 |
system | System Facility | 1000-1999 |
tacacs+ | TACACS+ Protocol Facility | 37000-37999 |
taclcp | TACLCP Facility | 44000-44999 |
tcap | Transaction Capabilities Application Part (TCAP) Protocol Logging Facility [SS7] | 86500-86699 |
testctrl | Test Controller Facility | 174000-174999 |
testmgr | Test Manager Facility | 175000-175999 |
threshold | Threshold Facility | 61000-61999 |
ttg | Tunnel Termination Gateway (TTG) Facility | 130000-130999 |
tucl | TCP/UDP Convergence Layer (TUCL) Facility [SS7] | 88500-88699 |
udr | User Data Record (UDR) Facility | 79000-79999 |
user-data | User-Data Facility | 51000-51999 |
user-l3tunnel | User L3 Tunnel Facility | 75000-75999 |
usertcp-stack | User TCP Stack Facility | 173300-173499 |
vim | Voice Instant Message (VIM) Facility | 60000, 60999 |
vinfo | VINFO Facility | 82000, 82999 |
vmgctrl | Virtual Media Gateway (VMG) Controller Facility | 41000, 41999 |
vmgctxmgr | VMG Context Manager Facility | 43000, 43999 |
vpn | Virtual Private Network (VPN) Facility | 5000-5999 |
wimax-data | WiMAX DATA Facility | 104900-104999 |
wimax-r6 | WiMAX R6 Protocol (Signaling) Facility | 104000-104899 |
Event Severities
The system provides the flexibility to configure the level of information that is displayed when logging is enabled. The following levels are supported:
-
critical: Logs only those events indicating a serious error has occurred that is causing the system tor a system component to cease functioning. This is the highest severity level.
-
error: Logs events that indicate an error has occurred that is causing the system or a system component to operate in a degraded state. This level also logs events with a higher severity level.
-
warning: Logs events that may indicate a potential problem. This level also logs events with a higher severity level.
-
unusual: Logs events that are very unusual and may need to be investigated. This level also logs events with a higher severity level.
-
info: Logs informational events and events with a higher severity level.
-
trace: Logs events useful for tracing and events with a higher severity level.
-
debug: Logs all events regardless of the severity.
Each of the above levels correspond to the "severity" level of the event ID. Therefore, only those event IDs with a "severity" level equal to the logging level are displayed.
Understanding Event ID Information in Logged Output
This section explains the event information that is displayed when logging is enabled.
The following displays a sample output for an event that was logged.
2011-Dec-11+5:18:41.993 [cli 30005 info] [8/0/609 cli:8000609 _commands_cli.c:1290] [software internal system] CLI session ended for Security Administrator admin on device /dev/pts/2
Element | Description |
---|---|
2011-Dec-11+5:18:41.993 | Date/Timestamp indicating when the event was generated |
[cli 30005 info] |
In this example, the event belongs to the CLI facility, has an ID of 3005, and a severity level of "info". |
[8/0/609 cli:8000609 _commands_cli.c:1290] | Information about the specific CLI instance. |
[software internal system] | Indicates that the event was generated because of system operation. |
CLI session ended for Security Administrator admin on device /dev/pts/2 | The event's details. Event details may, or may not include variables that are specific to the occurrence of the event. |