Configuring unix syslog servers, Configuring – Dell POWEREDGE M1000E User Manual

Page 716

Advertising
background image

32-12

Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide

OL-13270-03

Chapter 32 Configuring System Message Logging

Configuring System Message Logging

Beginning in privileged EXEC mode, follow these steps to enable configuration logging:

This example shows how to enable the configuration-change logger and to set the number of entries in
the log to 500.

Switch(config)# archive

Switch(config-archive)# log config

Switch(config-archive-log-cfg)# logging enable

Switch(config-archive-log-cfg)# logging size 500

Switch(config-archive-log-cfg)# end

This is an example of output for the configuration log:

Switch# show archive log config all

idx sess user@line Logged command

38 11 unknown user@vty3 |no aaa authorization config-commands

39 12 unknown user@vty3 |no aaa authorization network default group radius

40 12 unknown user@vty3 |no aaa accounting dot1x default start-stop group

radius

41 13 unknown user@vty3 |no aaa accounting system default

42 14 temi@vty4 |interface GigabitEthernet4/0/1

43 14 temi@vty4 | switchport mode trunk

44 14 temi@vty4 | exit

45 16 temi@vty5 |interface GigabitEthernet5/0/1

46 16 temi@vty5 | switchport mode trunk

47 16 temi@vty5 | exit

Configuring UNIX Syslog Servers

The next sections describe how to configure the UNIX server syslog daemon and how to define the
UNIX system logging facility.

Command

Purpose

Step 1

configure terminal

Enter global configuration mode.

Step 2

archive

Enter archive configuration mode.

Step 3

log config

Enter configuration-change logger configuration mode.

Step 4

logging enable

Enable configuration change logging.

Step 5

logging size entries

(Optional) Configure the number of entries retained in the configuration
log. The range is from 1 to 1000. The default is 100.

Note

When the configuration log is full, the oldest log entry is
removed each time a new entry is entered.

Step 6

end

Return to privileged EXEC mode.

Step 7

show archive log config

Verify your entries by viewing the configuration log.

Advertising