Logging – Extreme Networks Summit 300-48 User Manual

Page 138

Advertising
background image

138

Summit 300-48 Switch Software User Guide

Status Monitoring and Statistics

NOTE

Extreme Networks recommends that you set the system recovery level to

critical

. This allows

ExtremeWare to log an error to the syslog and automatically reboot the system after a critical exception.

Logging

The switch log tracks all configuration and fault information pertaining to the device. Each entry in the
log contains the following information:

• Timestamp

— The timestamp records the month and day of the event, along with the time (hours,

minutes, and seconds) in the form HH:MM:SS. If the event was caused by a user, the user name is
also provided.

• Fault level

Table 49 describes the four levels of importance that the system can assign to a fault.

By default, log entries that are assigned a critical or warning level remain in the log after a switch
reboot. Issuing a clear log command does not remove these static entries. To remove log entries of all
levels (including warning or critical), use the following command:

clear log static

• Subsystem

— The subsystem refers to the specific functional area to which the error refers. Table 50

describes the subsystems.

Table 49: Fault Levels Assigned by the Switch

Level

Description

Critical

A desired switch function is inoperable. The switch may need to
be reset.

Warning

A noncritical error that may lead to a function failure.

Informational

Actions and events that are consistent with expected behavior.

Debug

Information that is useful when performing detailed
troubleshooting procedures.

Table 50: Fault Log Subsystems

Subsystem

Description

Syst

General system-related information. Examples include memory,
power supply, security violations, fan failure, overheat
condition, and configuration mode.

STP

STP information. Examples include an STP state change.

Brdg

Bridge-related functionality. Examples include low table space
and queue overflow.

SNMP

SNMP information. Examples include community string
violations.

Telnet

Information related to Telnet login and configuration performed
by way of a Telnet session.

VLAN

VLAN-related configuration information.

Advertising