Step 8 - Logging and Alerts

<< Click to Display Table of Contents >>

Navigation:  Peer Management Center Help > Creating a File Collaboration Job >

Step 8 - Logging and Alerts

Previous pageReturn to chapter overviewNext page

 

File Event Logging

 

Various types of file collaboration events can be written to a log file and to the Event Log tab located within the File Collaboration Runtime View for the selected file collaboration job. Each job will log to the fc_event.log file located in the 'Hub\logs' subdirectory within the Peer Management Center installation directory. All log files are stored in a tab delimited format that can easily be read by Microsoft Excel or other Database applications.

 

 

Log Entry Severity Levels

 

 

 

Configuration

 

By default, all file collaboration activity is logged for all severity levels. You can enable or disable file event logging as well as select the level of granularity on what to log through the Logging and Alerts page, available by selecting Logging and Alerts from the tree node within the File Collaboration Configuration dialog.

 

jobconfig_logging_37

 

Below is a list of logging fields and their descriptions:

 

All (Informational, Warnings, Error, Fatal)

Errors and Warnings (Warnings, Error, Fatal)

 

 

Alerts

 

Configured in the screen shown above, various types of alerts will be logged to a log file and to the Alerts table located within the File Collaboration Runtime View for the selected job. Each file collaboration job will log to the fc_alert.log file located in the 'Hub\logs' subdirectory within the Peer Management Center installation directory. All log files are stored in a tab delimited format that can easily be read by Microsoft Excel or other database applications.

 

The default log level is WARNING which will show any warning or error alerts that occur during a running session. Depending on the severity of the alert, the session may need to be restarted.

 

 

Once all Logging and Alerts settings are set, you can either save the configuration and exit the dialog, or you can continue with the configuration process by going to Step 8 - Target Protection.