Oracle® Communications EAGLE Database Administration - System Management User's Guide Release 46.6 E93319 Revision 1 |
|
![]() Previous |
![]() Next |
This procedure is used to copy the EAGLE’s security log to the file transfer area of the fixed disk using the copy-seculog
command. The copy-seculog
command uses these parameters.
:dfile
– the name of the file created in the file transfer area containing the security log entries copied with the copy-seculog
command.eagle123.doc
), the filename must be enclosed in double quotes. For example, :dfile=“eagle123.doc”
.yymmddx.log
, where yymmdd
are the current year/month/day that the security log file was created, and x
is either a
if the security log on the active fixed disk is copied (slog=act
) or s
if the security log on the standby fixed disk is copied (slog=stb
).:slog
– the security log that is copied to the file transfer area, the security log on the active fixed disk (slog=act) or the standby fixed disk (slog=stb). The default value for this parameter is act
.
:dloc
– the file transfer area that is receiving the copy of the security log, the file transfer area on the active fixed disk (dloc=act) or the file transfer area on the standby fixed disk dloc=stb). The default value for this parameter is act
.
If a filename is not specified, the EAGLE specifies its own filename with this format, yymmddx.log
, where yymmdd
are the current year/month/day that the security log file was created, and x
is either a
for the copy of the security log on the active fixed disk or s
for the copy of the security log on the standby fixed disk.
The copy-seculog
command can be specified with no parameters. If the copy-seculog
command is specified with no parameters, the security log on the active fixed disk is copied to the file transfer area on the active fixed disk and is given a default name. The default name is in this format, yymmdda.log
, where yymmdd
are the current year/month/day that the security log file was created, and a
for the copy of the security log on the active fixed disk.
Figure 4-5 Copying the Security Log to the File Transfer Area
Sheet 1 of 2
Sheet 2 of 2