Log Management for ZTE Core Nodes

Embed Size (px)

Citation preview

  • 7/24/2019 Log Management for ZTE Core Nodes

    1/8

    Chapter 3

    Log ManagementAs an important part of security management, the log management supports the query of

    multiple logs. With this function, maintenance engineers can query user operation

    information and status of login users.

    Logs are classified into operation logs, security logs and system logs. l

    Operation logs

    Records user operation information, including operation log ID, operator, operation

    function, operation level, operation module, IP address, operation details, operation

    result, operation failure cause, access mode, start time, end time, and command code.

    l Security logs

    Records the user login log information, including security log ID, operator, IP address,

    security operation, operation time, access mode, and operation details.

    l System logs

    Records the completion status of timed tasks on the server, including log ID, level,

    source, log name, details, host address, start time, end time, and related log.

    If the number of the query result records is not greater than 512, the result is directly

    displayed. If the number of the query result records is greater than 512, all records are

    output to a file and the file path is provided. You can open the file to view the result. If the

    number of the query result records exceeds 10,000, a maximum of 10,000 records are

    output and the rest records are discarded.

    Table of Contents

    Querying Operation Logs .............................................................................................. 3-1

    Querying Security Logs ................................................................................................. 3-3

    Querying System Logs .................................................................................................. 3-5

    3.1 Querying Operation LogsBy querying operation logs, you can query the operators logging in to the OMM server,

    operation log ID, operator, operation function, operation level, operation module, IP

    address, operation details, operation result, operation failure cause, access mode, start

    time, ending time, and command code.

    3-1

    SJ-20120730093520-013|2012-10-31(R1.0) ZTE Proprietary and Confidential

  • 7/24/2019 Log Management for ZTE Core Nodes

    2/8

    ZXUN iCX(MSCS) General Operation Guide

    Steps

    1. In the command box of theTerminalwindow, enter theSHOW CMDLOGcommand,

    and select theMore... check box. TheSHOW CMDLOGconfiguration area is

    displayed, seeFigure 3-1.

    Figure 3-1SHOW CMDLOGConfiguration Area

    2. Enter the command parameters as needed. For the parameter description, refer to

    Table 3-1.

    Table 3-1 SHOW CMDLOG Parameter Description

    Parameter Description Setting

    User Name Name of the user. If no Enter the name of the user whose operation

    name is entered, the logs are to be queried.system queries operation

    logs of all users.

    Level Level of the operation. Options:Very Important,Important,

    Notice,Normal.

    Module Module to which the

    operation belongs.

    Options: Fault Management,

    Performance Management,Log

    Management,Security Management,

    Configuration Management,Trace

    Management,Backup and Restore,

    CMM Configuration Management,Other

    Management,Patrol Management,

    Version Management,Patch

    Management, Diagnostic Test, and

    NTP Management.

    IP Address IP address of the

    operation.

    Enter the IP address of the operation to be

    queried. If this parameter is not set, the

    system queries all IP addresses.

    3-2

    SJ-20120730093520-013|2012-10-31(R1.0) ZTE Proprietary and Confidential

  • 7/24/2019 Log Management for ZTE Core Nodes

    3/8

    Chapter 3 Log Management

    Parameter Description Setting

    Result Result of the operation. Options:SuccessandFailure.

    If this parameter is left blank, the system

    queries all operation results.

    Mode Mode of accessing the

    system.

    Including:OMM Client,SSH Client,EMS

    Client,NDF Client, andTELNET Client.

    Detail Details of an operation. Detailed information of an operation, for

    example, a completeMMLcommand.

    Start Time Start time of the

    operation log to be

    queried.

    -

    End Time End time of the operation The end time must be later than the start

    log to be queried. time.

    MML Code Code of the operation. -

    3. Click to query the operation logs.

    Example: If you query all operation logs,Figure 3-2shows the execution result.

    Figure 3-2 Result of Querying Operation Logs

    - End of Steps -

    3.2 Querying Security LogsBy querying security logs, you can know the information about user login, includingsecurity log ID, operator, IP address, security operation, operation time, access mode,

    and operation details.

    Steps

    1. In the command box of theTerminalwindow, enter theSHOW SCRTLOGcommand

    and select theMore... check box. TheSHOW SCRTLOGconfiguration area is

    displayed, seeFigure 3-3.

    3-3

    SJ-20120730093520-013|2012-10-31(R1.0) ZTE Proprietary and Confidential

  • 7/24/2019 Log Management for ZTE Core Nodes

    4/8

    ZXUN iCX(MSCS) General Operation Guide

    Figure 3-3SHOW SCRTLOGConfiguration Area

    2. Enter the command parameters as needed. For the parameter description, refer to

    Table 3-2.

    Table 3-2 SHOW SCRTLOG Parameter Description

    Parameter Description Setting

    User Name Name of the user whose security

    logs you want to query.

    Enter the name of the user whose

    security logs you want to query

    (Security logs of all users are

    searched if you leave this text box

    blank).

    IP Address IP address of the user whose

    security logs you want to query.

    Select the IP address of the user

    whose security logs are to be

    queried. If this parameter is not

    set, the system queries all IP

    addresses.

    Security Operation Security operation in the system. Options: Login Successfully,

    Login Failed,Logoutand

    Security Event.

    If this parameter is not set, the

    system queries all security

    operations.

    Mode Mode of accessing the system. Options:OMM Client,TELNETClient,SSH Client,NDF Client

    andEMS Client.

    If no mode is selected, the system

    queries all access modes.

    Detail Detailed user operation Enter the detailed user operation

    information. information of a user operation,

    such as a complete MML

    command.

    3-4

    SJ-20120730093520-013|2012-10-31(R1.0) ZTE Proprietary and Confidential

  • 7/24/2019 Log Management for ZTE Core Nodes

    5/8

    Chapter 3 Log Management

    Parameter Description Setting

    Start Time Start time of the security logs. Click theStart Timetext box, and

    set the start time in the displayed

    calendar control.

    End Time End time of the security logs. Click theEnd Timetext box, and

    set the end time in the displayed

    calendar control.

    The end time must be later than

    the start time.

    3. Click to query the security logs.

    Example: If you query all security logs,Figure 3-4shows the execution result.

    Figure 3-4 Result of Querying Security Logs

    - End of Steps -

    3.3 Querying System LogsBy querying system logs, you can know their information, including level, function name, log

    name, details, start time and end time.

    Steps

    1. In the command box of theTerminalwindow, enter theSHOW SYSLOGcommand,

    and select theMore... check box. TheSHOW SYSLOGconfiguration area is

    displayed, seeFigure 3-5.

    3-5

    SJ-20120730093520-013|2012-10-31(R1.0) ZTE Proprietary and Confidential

  • 7/24/2019 Log Management for ZTE Core Nodes

    6/8

    ZXUN iCX(MSCS) General Operation Guide

    Figure 3-5SHOW SYSLOGConfiguration Area

    2. Enter the command parameters as needed. For the parameter description, refer to

    Table 3-3.

    Table 3-3 SHOW SYSLOG Parameter Description

    Parameter Description Setting

    Level Level of the system log Optional, options:Emergency,Alert,

    to be queried. Error,Warning,Notice, andInformation.

    Function Name Function name of

    the system log to be

    queried.

    Optional, for example Patrol_Management.

    Log Name Name of the system log Optional.

    to be queried.

    Detail Detailed information of

    the system log to be

    queried.

    Optional.

    The entered information supports the fuzzy

    match.

    Start Time Start time of the system Click theStart Timetext box, and set the

    log to be queried. start time in the displayed calendar control.

    End Time End time of the system

    log to be queried.

    Click theEnd Timetext box, and set the

    end time in the displayed calendar control.

    3. Click to query the system logs.

    Example: If you query all system logs,Figure 3-6shows the execution result.

    3-6

    SJ-20120730093520-013|2012-10-31(R1.0) ZTE Proprietary and Confidential

  • 7/24/2019 Log Management for ZTE Core Nodes

    7/8

    Chapter 3 Log Management

    Figure 3-6 Result of Querying System Logs

    - End of Steps -

    3-7

    SJ-20120730093520-013|2012-10-31(R1.0) ZTE Proprietary and Confidential

  • 7/24/2019 Log Management for ZTE Core Nodes

    8/8

    ZXUN iCX(MSCS) General Operation Guide

    This page intentionally left blank.

    3-8

    SJ-20120730093520-013|2012-10-31(R1.0) ZTE Proprietary and Confidential