You can configure RSA Authentication Manager logging on each instance. You can copy the log configuration from the primary instance to the replica instance.
Before you begin
You must be a Super Admin.
In the Security Console, click Setup > System Settings.
Select an instance.
From the Trace Log, Administrative Audit Log, Runtime Audit Log, and System Log drop-down lists, select a log level. For a description of each parameter, see Log Configuration Parameters.
Determine where to store the log data. You can choose to save it:
Locally in the internal database only
Locally in the internal database and in the local operating system syslog
Locally in the internal database and the remote syslog at a specified hostname or IP address. The remote host must be a valid UNIX machine that Authentication Manager is permitted to access. The system resolves the remote hostname by referring to the Domain Name System that was configured during Quick Setup.