Introduction to Log Management

Log management includes managing system operation logs, device operation logs, syslog interworking logs and syslog receive configuration.

System Operation Log

System operation logs record various operations of the administrator in the ATIC management center. All operations that affect the database and are initiated by the administrator are logged. Such operations as view, query, and update that do not affect the database are not logged.

The administrator can perform the following operations on system operation logs:

NOTE:

Default administrator admin has all permissions. Common administrators that are assigned with the view, export, or dumping permissions can view, export, or dump their own operation logs only. Common administrators that have no view, export, or dumping permissions cannot view, export, or dump any operation logs.

The operation log level identifies the criticality of a log. The operation log level can be danger, minor, warning, or info from the most critical to the least critical. Table 1 defines the different levels of logs.
Table 1 Log levels

Level

Definition

Danger

Refers to the operations that make the whole system or function modules faulty or unavailable.

Warning

Refers to the normal operations that performed in the system or on function modules.

Minor

Refers to the operations that may cause data inconsistency in system or on function modules.

Info

Refers to the operations that performed to access data in system or on function modules.

Device Operation Log

The device operation log records information about all command lines delivered by the AntiDDoS.

Syslog Interworking Log

Syslog interworking logs record information about the logs that the Netflow device sends to the ATIC management center.

Syslog Receive Configuration

Configurate to receive Syslog.


Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.