Users Guide

Getting Started
This page provides a recommended guided workflow for getting started with ASM. A check mark
indicates that you have completed the step.
Application logs
ASM provides an activity log of user- and system-generated actions to use for troubleshooting activities.
By default, log entries display in the order they occurred.
You can view the following information:
Severity
— Indicates that the fatal error occurred while communicating with a managed resource;
corrective action is immediately required.
— Indicates that the resource is in a state that requires corrective action, but does not impact
overall system health. For example, a discovered resource is not supported.
— Indicates general information about system health or activity.
— Indicates that the component is working as expected.
Category
Security — Indicates the authentication failures, operations on ASM users, operations on
credentials
Appliance Configuration — Indicates the initial setup, appliance settings, backup and restore
Template Configuration — Indicates the operations on Service Templates
Network Configuration — Indicates the operations on networks, pools for MAC/IQN/WWPN/
WWNN
Infrastructure or Hardware Configuration — Indicates the hardware discovery, inventory
Infrastructure or Hardware Monitoring — Indicates the hardware health
Deployment — Indicates the Service template deployment operations
Licensing — Indicates the license updates and expirations
Miscellaneous — Indicates all other issues
Description — Displays brief summary of activity
Date and Time — Indicates the time when activity occurred and time is displayed using the client
machine time zone. If there are logs, the time captured when the message is logged is based on the
appliance time.
User — Indicates user name from which activity originated
On this page, you can:
View log entries
129