Configure Logging

Document created by RSA Information Design and Development on Jun 13, 2017Last modified by RSA Information Design and Development on Jun 13, 2017
Version 2Show Document
  • View in full screen mode

You can configure RSA Authentication Manager logging on each instance. You can copy the log configuration from the primary instance to the replica instance.

Before you begin 

You must be a Super Admin.

Procedure 

  1. In the Security Console, click Setup > System Settings.

  2. Click Logging.

  3. Select an instance.

  4. Click Next.

  5. From the Trace Log, Administrative Audit Log, Runtime Audit Log, and System Log drop-down lists, select a log level. For a description of each parameter, see Log Configuration Parameters.

  6. Determine where to store the log data. You can choose to save it:

    • Locally in the internal database only

    • Locally in the internal database and in the local operating system Syslog

    • Locally in the internal database and the remote Syslog at a specified hostname or IP address. The remote host must be a valid UNIX machine that Authentication Manager is permitted to access. The system resolves the remote hostname by referring to the Domain Name System that was configured during Quick Setup. or instructions on configuring a remote Syslog host to log messages from Authentication Manager, see Configure the Remote Syslog Host for Real Time Log Monitoring.

  7. If you are configuring log settings on the primary instance and you want to apply the same changes to the replica instance, click Apply the above settings to the replica instance(s) upon save.

  8. Click Save.

 

 

Related Concepts

Log Messages

 

 


Attachments

    Outcomes