The Logs Management window provides the ability to filter, download, and delete the SBC logs according to the log types.
For information on SBC's support for remote syslog servers and the supported log types, refer to Supported Log Types.
On the SBC main screen, navigate to Troubleshooting > Call Trace/Logs/Monitors > Log Management. The Logs Management window is displayed.
If there are no files generated by the SBC for a type of log/trace, the corresponding log/trace option is not displayed in the list within the Log Management pane.
The Log Management pane is divided into the two vertical sections:
Once a log is selected, the right side provides the details of log management parameters for the log type selected in the left section:
This section remains blank until a log type is selected from the list.
The following log types are displayed in the Log Management pane:
For security protection, the Netconf interface does not support "/aaa" records.
The log files related to user activities in the EMA are available at the following directory of the SBC: /var/log/sonus/ema/log
Click displayed against the respective log. See Log Types table above for the description of each log.
Depending on the browser settings, the file either opens in a text viewer automatically or a download confirmation window is displayed. You can view the log in a notepad or save it on local drive.
Once downloaded, open the log file with text editors like Notepad++. Any popular text editor program is capable of opening the log files. However, text editors used for programming displays the log files in a properly formatted manner.
The examples below shows content samples from random Platform Audit Log files and Event Audit Log files.
Platform Audit Log file - Sample Content
type=DAEMON_START msg=audit(1498713982.579:6028): auditd start, ver=1.7.18 format=raw kernel=3.16.39 auid=0 pid=29874 res=success type=CONFIG_CHANGE msg=audit(1498713982.679:2): audit_backlog_limit=400 old=64 auid=0 ses=3112 res=1 type=CONFIG_CHANGE msg=audit(1498713982.699:3): auid=0 ses=3112 op="add rule" key="delete" list=4 res=1 type=CONFIG_CHANGE msg=audit(1498713982.727:4): auid=0 ses=3112 op="add rule" key="exclude" list=4 res=1 type=CONFIG_CHANGE msg=audit(1498713982.739:5): auid=0 ses=3112 op="add rule" key="exclude" list=4 res=1 type=CONFIG_CHANGE msg=audit(1498713982.755:6): auid=0 ses=3112 op="add rule" key="exclude" list=4 res=1 type=CONFIG_CHANGE msg=audit(1498713982.767:7): auid=0 ses=3112 op="add rule" key="exclude" list=4 res=1 type=LOGIN msg=audit(1498714380.853:35): pid=32295 uid=0 old-auid=0 auid=3000 old-ses=95 ses=3113 res=1 type=LOGIN msg=audit(1498714382.993:36): pid=32437 uid=0 old-auid=0 auid=3000 old-ses=95 ses=3114 res=1 type=LOGIN msg=audit(1498714501.897:37): pid=878 uid=0 old-auid=4294967295 auid=0 old-ses=4294967295 ses=3115 res=1 type=LOGIN msg=audit(1498714563.885:38): pid=1185 uid=0 old-auid=4294967295 auid=0 old-ses=4294967295 ses=3116 res=1 type=LOGIN msg=audit(1498714632.126:39): pid=1551 uid=0 old-auid=0 auid=3000 old-ses=95 ses=3117 res=1 type=LOGIN msg=audit(1498714634.518:40): pid=1757 uid=0 old-auid=4294967295 auid=0 old-ses=4294967295 ses=3118 res=1 type=SYSCALL msg=audit(1498715463.941:53): arch=c000003e syscall=91 success=yes exit=0 a0=3 a1=180 a2=180 a3=0 items=1 ppid=7168 pid=7172 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=3130 comm="logrotate" exe="/usr/sbin/logrotate" key="permission-change" type=PATH msg=audit(1498715463.941:53): item=0 name=(null) inode=313909 dev=fe:00 mode=0100600 ouid=0 ogid=0 rdev=00:00 nametype=NORMAL type=UNKNOWN[1327] msg=audit(1498715463.941:53): proctitle=2F7573722F7362696E2F6C6F67726F74617465002F6574632F7362784C6F67726F746174652E636F6E66 type=SYSCALL msg=audit(1498715463.941:54): arch=c000003e syscall=91 success=yes exit=0 a0=3 a1=1b0 a2=0 a3=0 items=1 ppid=7168 pid=7172 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=3130 comm="logrotate" exe="/usr/sbin/logrotate" key="permission-change" type=PATH msg=audit(1498715463.941:54): item=0 name=(null) inode=313909 dev=fe:00 mode=0100600 ouid=0 ogid=0 rdev=00:00 nametype=NORMAL type=UNKNOWN[1327] msg=audit(1498715463.941:54): proctitle=2F7573722F7362696E2F6C6F67726F74617465002F6574632F7362784C6F67726F746174652E636F6E66 type=LOGIN msg=audit(1498715701.725:55): pid=8550 uid=0 old-auid=4294967295 auid=0 old-ses=4294967295 ses=3131 res=1 type=LOGIN msg=audit(1498716085.366:56): pid=10571 uid=0 old-auid=4294967295 auid=0 old-ses=4294967295 ses=3132 res=1 type=LOGIN msg=audit(1498716129.369:57): pid=11232 uid=0 old-auid=4294967295 auid=0 old-ses=4294967295 ses=3133 res=1
Event Audit Log file - Sample Content
The sample shown below is from a Event Log file with a .AUD
extension. The possible extensions for a Event Log file are:
.SEC
.AUD
.DBG
.SYS
.ACT
.TRC
.PKT
Sonus Networks, Inc.0000000001600000000000000000000128V05.01.02A018 0000000000000000000000000000AUD2017062101353200000000000000 117 06212017 013605.774579:1.01.00.00000.Minor .CHM: audit user: admin/18 Logged out from maapi ctx=maapi (closed) 128 06212017 013609.134089:1.01.00.00000.Minor .SBCINTF: audit user: callTraceGuest/0 logged in over ssh from ::1 through cli 131 06212017 013735.315029:1.01.00.00000.Minor .CHM: audit user: admin/22 context: netconf /snmp/trapTarget{emaTarget}: created 144 06212017 013735.315271:1.01.00.00000.Minor .CHM: audit user: admin/22 context: netconf /snmp/trapTarget{emaTarget}/name: set to emaTarget 139 06212017 013735.315552:1.01.00.00000.Minor .CHM: audit user: admin/22 context: netconf /snmp/trapTarget{emaTarget}/port: set to 8162 143 06212017 013735.315804:1.01.00.00000.Minor .CHM: audit user: admin/22 context: netconf /snmp/trapTarget{emaTarget}/state: set to enabled 150 06212017 013735.316048:1.01.00.00000.Minor .CHM: audit user: admin/22 context: netconf /snmp/trapTarget{emaTarget}/targetUsername: set to admin 149 06212017 013735.316332:1.01.00.00000.Minor .CHM: audit user: admin/22 context: netconf /snmp/trapTarget{emaTarget}/ipAddress: set to 127.0.0.1 158 06212017 013735.316556:1.01.00.00000.Minor .CHM: audit user: admin/22 context: netconf /snmp/trapTarget{emaTarget}/targetSecurityLevel: set to authPriv 203 06212017 013735.318434:1.01.00.00000.Minor .CHM: audit user: admin/22 context: netconf /SNMP-TARGET-MIB/snmpTargetAddrTable/snmpTargetAddrEntry{emaTarget}/snmpTargetAddrTagList: set to std_v2_trap 209 06212017 013735.318694:1.01.00.00000.Minor .CHM: audit user: admin/22 context: netconf /SNMP-TARGET-MIB/snmpTargetAddrTable/snmpTargetAddrEntry{emaTarget}/snmpTargetAddrTAddress: set to 127.0.0.1.31.226 205 06212017 013735.318944:1.01.00.00000.Minor .CHM: audit user: admin/22 context: netconf /SNMP-TARGET-MIB/snmpTargetAddrTable/snmpTargetAddrEntry{emaTarget}/snmpTargetAddrTDomain: set to 1.3.6.1.6.1.1 202 06212017 013735.319195:1.01.00.00000.Minor .CHM: audit user: admin/22 context: netconf /SNMP-TARGET-MIB/snmpTargetAddrTable/snmpTargetAddrEntry{emaTarget}/snmpTargetAddrParams: set to std_v2_trap 196 06212017 013735.319450:1.01.00.00000.Minor .CHM: audit user: admin/22 context: netconf /SNMP-TARGET-MIB/snmpTargetAddrTable/snmpTargetAddrEntry{emaTarget}/snmpTargetAddrTimeout: set to 1500 207 06212017 013735.319703:1.01.00.00000.Minor .CHM: audit user: admin/22 context: netconf /SNMP-TARGET-MIB/snmpTargetAddrTable/snmpTargetAddrEntry{emaTarget}/snmpTargetAddrStorageType: set to nonVolatile 196 06212017 013735.319953:1.01.00.00000.Minor .CHM: audit user: admin/22 context: netconf /SNMP-TARGET-MIB/snmpTargetAddrTable/snmpTargetAddrEntry{emaTarget}/snmpTargetAddrRetryCount: set to 3 192 06212017 013735.320232:1.01.00.00000.Minor .CHM: audit user: admin/22 context: netconf /SNMP-TARGET-MIB/snmpTargetAddrTable/snmpTargetAddrEntry{emaTarget}/snmpTargetAddrMMS: set to 2048 211 06212017 013735.320994:1.01.00.00000.Minor .CHM: audit user: admin/22 context: netconf /SNMP-TARGET-MIB/snmpTargetParamsTable/snmpTargetParamsEntry{std_v3_trap_emaTarget}/snmpTargetParamsMPModel: set to 3 220 06212017 013735.321242:1.01.00.00000.Minor .CHM: audit user: admin/22 context: netconf /SNMP-TARGET-MIB/snmpTargetParamsTable/snmpTargetParamsEntry{std_v3_trap_emaTarget}/snmpTargetParamsSecurityName: set to admin 217 06212017 013735.321490:1.01.00.00000.Minor .CHM: audit user: admin/22 context: netconf /SNMP-TARGET-MIB/snmpTargetParamsTable/snmpTargetParamsEntry{std_v3_trap_emaTarget}/snmpTargetParamsSecurityModel: set to 3 225 06212017 013735.321740:1.01.00.00000.Minor .CHM: audit user: admin/22 context: netconf /SNMP-TARGET-MIB/snmpTargetParamsTable/snmpTargetParamsEntry{std_v3_trap_emaTarget}/snmpTargetParamsStorageType: set to nonVolatile 177 06212017 015350.802472:1.01.00.00000.Minor .CHM: audit user: admin/35 context: netconf /system/admin{WFDSBC01}/accountManagement/sessionIdleTimeout/state: set to disabled 177 06212017 015350.802749:1.01.00.00000.Minor .CHM: audit user: admin/35 context: netconf /system/admin{WFDSBC01}/accountManagement/sessionIdleTimeout/idleTimeout: set to 10 128 06212017 015350.924047:1.01.00.00000.Minor .CHM: audit user: admin/35 context: netconf /system/admin{WFDSBC01}: modified 157 06212017 015350.924593:1.01.00.00000.Minor .CHM: audit user: admin/35 context: netconf /system/admin{WFDSBC01}/accountManagement/maxSessions: set to 5 105 06212017 015415.138074:1.01.00.00000.Minor .SBCINTF: audit user: admin/0 Logged out ssh <PAM> user 129 06212017 015419.485411:1.01.00.00000.Minor .SBCINTF: audit user: admin/0 logged in over ssh from 127.0.0.1 through netconf 129 06212017 015420.657710:1.01.00.00000.Minor .SBCINTF: audit user: admin/0 logged in over ssh from 127.0.0.1 through netconf 129 06212017 015421.825934:1.01.00.00000.Minor .SBCINTF: audit user: admin/0 logged in over ssh from 127.0.0.1 through netconf
Once a log file is deleted, it cannot be retrieved from any location.
Click displayed against the respective logs.
A delete confirmation dialog box is displayed.