Home > Cisco > Control System > Cisco Acs 5x User Guide

Cisco Acs 5x User Guide

Here you can view all the pages of manual Cisco Acs 5x User Guide. The Cisco manuals for Control System are available online for free. You can easily download all the documents as PDF.

Page 561

19-5
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 19      Understanding Logging
  About Logging
Local Store Target
Log messages in the local store are text files that are sent to one log file, located at 
/opt/CSCOacs/logs/localStore/, regardless of which logging category they belong to. The local store can 
only contain log messages from the local ACS node; the local store cannot accept log messages from 
other ACS nodes.
You can configure which logs are sent to the local...

Page 562

19-6
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 19      Understanding Logging
  About Logging
Table 19-2 Local Store and Syslog Message Format
Field Description
timestampDate of the message generation, according to the local clock of the 
originating ACS, in the format YYYY- MM-DD hh:mm:ss:xxx +/-zh:zm. 
Possible values are:
YYYY = Numeric representation of the year.
MM = Numeric representation of the month. For single-digit months (1 
to 9) a zero precedes the number.
DD =...

Page 563

19-7
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 19      Understanding Logging
  About Logging
You can use the web interface to configure the number of days to retain local store log files; however, 
the default setting is to purge data when it exceeds 5 MB or each day, whichever limit is first attained.
If you do configure more than one day to retain local store files and the data size of the combined files 
reaches 95000Mb, a FATAL message is sent to the system diagnostic...

Page 564

19-8
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 19      Understanding Logging
  About Logging
When you configure a critical log target, and a message is sent to that critical log target, the message is 
also sent to the configured noncritical log target on a best-effort basis.
When you configure a critical log target, and a message does not log to that critical log target, the 
message is also not sent to the configured noncritical log. 
When you do not configure a critical...

Page 565

19-9
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 19      Understanding Logging
  About Logging
Table 19-3 Remote Syslog Message Header Format
Field Description
pri_numPriority value of the message; a combination of the facility value and the 
severity value of the message. Priority value = (facility value* 8) + severity 
value. The facility code valid options are:
LOCAL0 (Code = 16)
LOCAL1 (Code = 17)
LOCAL2 (Code = 18)
LOCAL3 (Code = 19)
LOCAL4 (Code = 20)
LOCAL5 (Code =...

Page 566

19-10
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 19      Understanding Logging
  About Logging
The syslog message data or payload is the same as the Local Store Message Format, which is described 
in Table 19-2.
The remote syslog server targets are identified by the facility code names LOCAL0 to LOCAL7 (LOCAL6 
is the default logging location.) Log messages that you assign to the remote syslog server are sent to the 
default location for Linux syslog (/var/log/messages),...

Page 567

19-11
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 19      Understanding Logging
  About Logging
The Monitoring & Report Viewer has two drawer options:
Monitoring and Reports—Use this drawer to view and configure alarms, view log reports, and 
perform troubleshooting tasks.
Monitoring Configuration—Use this drawer to view and configure logging operations and system 
settings.
In addition to the information that is captured in the log messages described in Logging Categories,...

Page 568

19-12
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 19      Understanding Logging
  ACS 4.x Versus ACS 5.3 Logging
ACS 4.x Versus ACS 5.3 Logging
If you are familiar with the logging functionality in ACS 4.x, ensure that you familiarize yourself with 
the logging functionality of ACS 5.3, which is considerably different. Ta b l e 1 9 - 4 describes the 
differences between the logging functionality of ACS 4.x and ACS 5.3.
Table 19-4 ACS 4.x vs. ACS 5.3 Logging Functionality...

Page 569

19-13
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 19      Understanding Logging
  ACS 4.x Versus ACS 5.3 Logging
Configuration Use the System Configuration > Logging 
page to define:
Loggers and individual logs
Critical loggers
Remote logging
CSV log file
Syslog log
ODBC logSee Configuring Logs, page 18-21 and the 
CLI Reference Guide for the Cisco Secure 
Access Control System 5.3.
Viewing and Downloading Log 
MessagesUse the Reports and Activity pages. See Viewing Log...

Page 570

19-14
User Guide for Cisco Secure Access Control System 5.3
OL-24201-01
Chapter 19      Understanding Logging
  ACS 4.x Versus ACS 5.3 Logging 
Start reading Cisco Acs 5x User Guide

Related Manuals for Cisco Acs 5x User Guide

All Cisco manuals