![]() ![]() This file is renamed in the XXX.N.log format, where: Once a log file touches the configured limit, the data is rolled over to another file. ![]() The log files are numbered and rolled over based on a configured maximum file size. Log files in ACS are managed using various utilities, such as log rotate, log4j, and log4cxx. Packaged files within a temporary directory opt/CSCOacs/runtime/config/ startup_cache Table 1 Disk Space Allocation for ACS Process Logs Process Table 1 describes the disk space allocated for each set of log files. Managing disk space on the CSACS-1121, Cisco SNS-3415, or Cisco SNS-3495 is important to enable you to use ACS efficiently. This section describes disk space management for the purpose of managing logs that you can view or download from the ACS CLI and includes: ![]() Note: If an error occurs in any command usage, use the debug command to determine the cause of the error.īefore proceeding to use the ACS CLI commands, familiarize yourself with disk space management in the CSACS-1121, Cisco SNS-3415, or Cisco SNS-3495 appliance. ![]() Throughout this chapter, the ACS server uses the name acs in place of the ACS server’s hostname. Use the EXEC mode system-level configure command to access configuration mode.Įach of the commands in this chapter is followed by a brief description of its use, command syntax, usage guidelines, and one or more examples. Use the EXEC mode system-level acs-confi g command to access ACS configuration mode. The following modes are available with these commands: This chapter contains an alphabetical listing of the commands that are specific to Cisco Secure ACS 5.8. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |