IBM 12.1(22)EA6 Switch User Manual


 
20-8
Cisco Systems Intelligent Gigabit Ethernet Switch Modules for the IBM BladeCenter, Software Configuration Guide
24R9746
Chapter 20 Configuring System Message Logging
Configuring System Message Logging
Enabling and Disabling Sequence Numbers in Log Messages
Because there is a chance that more than one log message can have the same timestamp, you can display
messages with sequence numbers so that you can unambiguously see a single message. By default,
sequence numbers in log messages are not displayed.
Beginning in privileged EXEC mode, follow these steps to enable sequence numbers in log messages:
To disable sequence numbers, use the no service sequence-numbers global configuration command.
This example shows part of a logging display with sequence numbers enabled:
000019: %SYS-5-CONFIG_I: Configured from console by vty2 (10.34.195.36)
Defining the Message Severity Level
You can limit messages displayed to the selected device by specifying the severity level of the message,
which are described in Table 20-3.
Beginning in privileged EXEC mode, follow these steps to define the message severity level:
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
service sequence-numbers Enable sequence numbers.
Step 3
end Return to privileged EXEC mode.
Step 4
show running-config Verify your entries.
Step 5
copy running-config startup-config (Optional) Save your entries in the configuration file.
Command Purpose
Step 1
configure terminal Enter global configuration mode.
Step 2
logging console level Limit messages logged to the console.
By default, the console receives debugging messages and numerically
lower levels (see Table 20-3 on page 20-9).
Step 3
logging monitor level Limit messages logged to the terminal lines.
By default, the terminal receives debugging messages and numerically
lower levels (see Table 20-3 on page 20-9).
Step 4
logging trap level Limit messages logged to the syslog servers.
By default, syslog servers receive informational messages and
numerically lower levels (see Table 20-3 on page 20-9).
For complete syslog server configuration steps, see the “Configuring
UNIX Syslog Servers” section on page 20-10.
Step 5
end Return to privileged EXEC mode.