You are here: Home > CLI Commands > Just_CLI_Topics > logging

logging

logging [ap-debug|arm|arm-user-debug|facility|network|security|system|user|user-debug|wireless|<ipv4addr>|<ipv6addr>]

Description

Use this command to specify the IP address of the remote logging server, facility, severity, and the type.

Syntax

Parameter

Description

Range

Default

ap-debug

AP troubleshooting messages. You must specify a debug value.

arm

ARMAdaptive Radio Management. ARM dynamically monitors and adjusts the network to ensure that all users are allowed ready access. It enables full utilization of the available spectrum to support maximum number of users by intelligently choosing the best RF channel and transmit power for APs in their current RF environment. messages.

arm-user-debug

ARMAdaptive Radio Management. ARM dynamically monitors and adjusts the network to ensure that all users are allowed ready access. It enables full utilization of the available spectrum to support maximum number of users by intelligently choosing the best RF channel and transmit power for APs in their current RF environment. user troubleshooting messages. You must specify a MACMedia Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network. address.

facility

Set the facility to be used when logging to the remote syslog server. The local use facilities (local0, local1, local2, local3, local4, local5, local6, and local7) are not reserved for specific message-generating sources, and can be used for sending syslog messages.

local 0 to local 7

network

Network messages.

security

Security messages.

system

System messages.

user

User messages.

user-debug

User troubleshooting messages. You must specify a MACMedia Access Control. A MAC address is a unique identifier assigned to network interfaces for communications on a network. address.

wireless

Wireless messages.

<ipv4addr>

To set the remote logging server IPv4 address.

A.B.C.D

facility

The facility to be used when logging to a remote syslog server.

local0 to local7

format

The format of the logs when logging to a remote syslog server.

cef - Common Event Fformat

bsd-standard - Berkeley Software Distribution standard or RFCRequest For Comments. RFC is a commonly used format for the Internet standards documentss.-3164 format

severity

Set the remote logging server severity to:

alerts - Immediate action required

critical - Critical Condition

debugging - Debug Messages

emergencies - System is unusable

errors - Error Conditions in the system

informational - Informational Messages

notifications - Normal but significant condition

warnings - Warning condition

type

Set the remote logging server message type to:

ap-debug - AP Debug Logs

arm - ARMAdaptive Radio Management. ARM dynamically monitors and adjusts the network to ensure that all users are allowed ready access. It enables full utilization of the available spectrum to support maximum number of users by intelligently choosing the best RF channel and transmit power for APs in their current RF environment. logs

arm-user-debug - ARMAdaptive Radio Management. ARM dynamically monitors and adjusts the network to ensure that all users are allowed ready access. It enables full utilization of the available spectrum to support maximum number of users by intelligently choosing the best RF channel and transmit power for APs in their current RF environment. User Debug Logs

network - Network logs

security - Security logs

system - System logs

user- User logs

user-debug - User Debug Logs

wireless - Wireless logs

<ipv6addr>

To set the remote logging server IPv6 address.

X:X:X:X::X

facility

The facility to be used when logging to a remote syslog server.

local0 to local7

format

The format of the logs when logging to a remote syslog server.

cef - Common Event Fformat

bsd-standard - Berkeley Software Distribution standard or RFCRequest For Comments. RFC is a commonly used format for the Internet standards documentss.-3164 format

severity

Set the remote logging server severity to:

alerts - Immediate action required

critical - Critical Condition

debugging - Debug Messages

emergencies - System is unusable

errors - Error Conditions in the system

informational - Informational Messages

notifications - Normal but significant condition

warnings - Warning condition

source-interface

Select source address of outgoing syslog messages.

 

 

type

Set the remote logging server message type to:

ap-debug - AP Debug Logs

arm - ARMAdaptive Radio Management. ARM dynamically monitors and adjusts the network to ensure that all users are allowed ready access. It enables full utilization of the available spectrum to support maximum number of users by intelligently choosing the best RF channel and transmit power for APs in their current RF environment. logs

arm-user-debug - ARMAdaptive Radio Management. ARM dynamically monitors and adjusts the network to ensure that all users are allowed ready access. It enables full utilization of the available spectrum to support maximum number of users by intelligently choosing the best RF channel and transmit power for APs in their current RF environment. User Debug Logs

network - Network logs

security - Security logs

system - System logs

user- User logs

user-debug - User Debug Logs

wireless - Wireless logs

<level>

The message severity level, which can be one of the following (in order of severity level):

alerts - Any condition requiring immediate attention and correction.

critical - Any critical conditions, such as hard drive errors.

debugging - Messages containing information for debugging purposes.

emergencies - Panic conditions that occur when the system becomes unstable.

errors - Error conditions.

informational - Significant events of a non-critical and normal nature.

notifications - Normal but significant condition.

warnings - Warning messages.

 

 

process

Controller process, which can be one of the following:

aaa - AAAAuthentication, Authorization, and Accounting. AAA is a security framework to authenticate users, authorize the type of access based on user credentials, and record authentication events and information about the network access and network resource consumption. logging

activate - Integration and communication with an Activate server

amon_recvr - AMONAdvanced Monitoring. AMON is used in Aruba WLAN deployments for improved network management, monitoring and diagnostic capabilities. receiver

amon_sender - AMONAdvanced Monitoring. AMON is used in Aruba WLAN deployments for improved network management, monitoring and diagnostic capabilities. sender

apprf - APPRF feature

approc - AP processes

armd - ARMAdaptive Radio Management. ARM dynamically monitors and adjusts the network to ensure that all users are allowed ready access. It enables full utilization of the available spectrum to support maximum number of users by intelligently choosing the best RF channel and transmit power for APs in their current RF environment. processes

authmgr - User authentication

ble_relay - BLEBluetooth Low Energy. The BLE functionality is offered by Bluetooth® to enable devices to run for long durations with low power consumption. relay process

bocmgr - BOC manager process

cert_dwnld - Certificate download process

certmgr - Certificate manager

cfgdist - Config Distributor

cfgm - Configuration Manager

cli - Command Line Interface

cluster_mgr - Cluster Manager

cpsec - Control plane security

crypto - VPNVirtual Private Network. VPN enables secure access to a corporate network when located remotely. It enables a computer to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security, and management policies of the private network. This is done by establishing a virtual point-to-point connection through the use of dedicated connections, encryption, or a combination of the two. (IKEInternet Key Exchange. IKE is a key management protocol used with IPsec protocol to establish a secure communication channel. IKE provides additional feature, flexibility, and ease of configuration for IPsec standard./IPsecInternet Protocol security. IPsec is a protocol suite for secure IP communications that authenticates and encrypts each IP packet in a communication session.)

cts - Transport service

dbsync - Database synchronization

dds - Logging for DDS processes

dhcpd - DHCPDynamic Host Configuration Protocol. A network protocol that enables a server to automatically assign an IP address to an IP-enabled device from a defined range of numbers configured for a given network.  packets

dpagent - DPAGENT process

esi - External Services Interface

extifmgr - External Interface Manager

fpapps - Layer 2 and 3 control

fw_visibility - FirewallFirewall is a network security system used for preventing unauthorized access to or from a private network. visibility processes

gsmmgr - GSM manager

ha_mgr - High availability manager

hcm - Health check process

httpd - Apache process

hwmon - Hardware monitoring

iapmgr - Instant AP manager process

ip_flow_export - IP Flow Export process

ipstm - Instant station manager process

l2tp - L2TPLayer-2 Tunneling Protocol. L2TP is a networking protocol used by the ISPs to enable VPN operations.

lagm - Logging for lagm process

licensemgr - License manager

llldp - LLLDP process

localdb - Local database

mdns - Multicast DNSDomain Name System. A DNS server functions as a phone book for the intranet and Internet users. It converts human-readable computer host names into IP addresses and IP addresses into host names. It stores several records for a domain name such as an address 'A' record, name server (NS), and mail exchanger (MX) records. The Address 'A' record is the most important record that is stored in a DNS server, because it provides the required IP address for a network peripheral or element. proxy

mobileip - Mobile IP

mon_serv - mon_serv process

mon_serv_fwv - mon_serv_fwv process

npppd - NPPPD

ofa - OpenFlowOpenFlow is an open communications interface between control plane and the forwarding layers of a network. Agent Process

ospf - OSPFOpen Shortest Path First. OSPF is a link-state routing protocol for IP networks. It uses a link-state routing algorithm and falls into the group of interior routing protocols that operates within a single Autonomous System (AS). logging

packetfilter - Packet filtering of messaging and control frames

phonehome - PhoneHome

pim - Protocol Independent Multicast

pppd - PPPPoint-to-Point Protocol. PPP is a data link (layer 2) protocol used to establish a direct connection between two nodes. It can provide connection authentication, transmission encryption, and compression.

pppoed - PPPoEPoint-to-Point Protocol over Ethernet. PPPoE is a method of connecting to the Internet, typically used with DSL services, where the client connects to the DSL modem.

pptp - PPTPPoint-to-Point Tunneling Protocol. PPTP is a method for implementing virtual private networks. It uses a control channel over TCP and a GRE tunnel operating to encapsulate PPP packets.

processes - Run-time process

profmgr - Profile Manager

publisher - Publish subscribe service

radvd - RARouter Advertisement. The RA messages are sent by the routers in the network when the hosts send multicast router solicitation to the multicast address of all routers. daemon

resolvwrap - Resolve wrap process

rfm - RFRadio Frequency. RF refers to the electromagnetic wave frequencies within a range of 3 kHz to 300 GHz, including the frequencies used for communications or Radar signals. Troubleshooting Manager

rng-mgr - RNG Manager

rsync - Rsync

rtpa - RTPA process

sc_replication_mgr - SC Replication Manager

snmp - SNMPSimple Network Management Protocol. SNMP is a TCP/IP standard protocol for managing devices on IP networks. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks, and more. It is used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention. 

spectrum - Spectrum analysis processes

stm - Station management

survival - Auth survival

syslogdwrap - Syslogd wrap

traffic - Traffic process

ucm - Unified Communication and Collaboration processes

upgrademgr - Upgrade Manager

util-proc - Util process

vrrp - Logging for vrrp process

web_cc - Web Content classification

webd - Web Daemon.

wms - Wireless management

 

 

subcat

Message subcategory, which depends upon the message category specified. The following lists the subcategories available for each message category:

ap-debug: all, ap-config, ha, sdn

arm: all, client-match, radio-mgmt

arm-user-debug: all

network: all, cluster, dhcp, gp, mobility, packet-dump, sdn

security: aaa, all, auth-amon, certinit, certmgr, cluster, cpnw, cpsec, db, 802.1X802.1X is an IEEE standard for port-based network access control designed to enhance 802.11 WLAN security. 802.1X provides an authentication framework that allows a user to be authenticated by a central authority., firewallFirewall is a network security system used for preventing unauthorized access to or from a private network., HA, ids, ids-ap, kerberos, mobility, packet-trace, vpn, webserver, wl-sync

system: all, amon, amon-ale, amon-amp, ap, ap-config, cluster, configuration, cpnw, gp, ha, mapc, messages, ofc-event-dispatcher, ofc-flow-manager, ofc-packet-dispatcher, ofc-routing-switch, ofc-switch-manager, ofc-topology, ofc-topology-discovery, pan, reg-tbl, snmp, validation, webserver

user: all, captive portalA captive portal is a web page that allows the users to authenticate and sign in before connecting to a public-access network. Captive portals are typically used by business centers, airports, hotel lobbies, coffee shops, and other venues that offer free Wi-Fi hotspots for the guest users., client-match, cpnw, 802.1X802.1X is an IEEE standard for port-based network access control designed to enhance 802.11 WLAN security. 802.1X provides an authentication framework that allows a user to be authenticated by a central authority., mapc, pan, radius, vpn

user-debug: all, configuration

wireless: all

 

 

Usage Guidelines

The local use facilities (local0, local1, local2, local3, local4, local5, local6, and local7) are not reserved for specific message-generating sources, and can be used for sending syslog messages. Use the show logging command to verify that the device sends logging messages.

There are eight logging severity levels, each with its associated types of messages. Each level also includes the levels below it. For example, if you set the logging level to informational (6), all messages from level 0 through level 5 (from emergencies through notifications) are also logged. The warnings severity level is set by default for all message categories.

Only the logging level warnings security subcat ids and logging level warnings security subcat ids-ap subcategories are enabled by default. Other subcategories are not generated by default even their severity is warning or higher.

Example

The following command adds the remote logging server with the IP address 10.1.2.3 with a user log type using local4.

(host) [mynode] (config) #logging 10.1.2.3 facility local4

Command History

Release

Modification

ArubaOS 8.2.0.0

New system processes called vrrp and lagm are added to debug issues related to the vrrp process and lagm process.

ArubaOS 8.1.0.0

The logging level <severity> was moved to the end of the command string.

The format parameter was introduced.

ArubaOS 8.0.0.0

Command introduced.

Command Information

Platforms

License

Command Mode

Available on all platforms

Base operating system.

Config mode on Mobility Master.

/*]]>*/