Red Hat NETSCAPE MANAGEMENT SYSTEM 4.5 - COMMAND-LINE Guide de l'utilisateur Page 57

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 270
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 56
3 – Managing Fabrics
Displaying Fabric Information
59056-00 Rev. B 3-11
D
3.3.2.1
Filtering the Event Browser
Filtering the Event Browser enables you to display only those events that are of
interest based on the event severity, timestamp, source, type, and description. To
filter the Event Browser, open the Filter menu and select Filter Entries. This
opens the Filter Events dialog shown in Figure 3-3. The Event Browser displays
those events that meet all of the criteria in the Filter Events dialog. If the filtering
criteria is cleared or changed, then all the events that were previously hidden that
satisfy the new criteria will be shown.
You can filter the event browser in the following ways:
Severity – Check one or more of the corresponding check boxes to display
alarm events, critical events, warning events, normal events, or informative
events.
Date/Time – Check one or both of the From: and To: check boxes. Enter the
bounding timestamps (MM/dd/yy hh:mm:ss aa) to display only those events
that fall within those times. ("aa" indicates AM or PM.) The current year (yy)
can be entered as either 2 or 4 digits. For example, 12/12/03 will be
interpreted December 12, 2003.
Text – Check one or more of the corresponding check boxes and enter a text
string (case sensitive) for event source, type, and description. The Event
Browser displays only those events that satisfy all of the search
specifications for the Source, Type, and Description text.
Note: Events (Critical, Warning, Normal, and Informative) are generated
by the application and are not saved on the switch. They are
permanently discarded when you close a SANbox Manager
session, but you can save these events to a file on the workstation
before you close SANbox Manager and read it later with a text
editor or browser.
Alarms are generated by the switch, stored on switch, and will be
retrieved when the application is restarted. Some alarms are
configurable. Refer to ”Configuring Port Threshold Alarms” on
page 4-13.
Vue de la page 56
1 2 ... 52 53 54 55 56 57 58 59 60 61 62 ... 269 270

Commentaires sur ces manuels

Pas de commentaire