Users Guide
Getting Started
This page provides a recommended guided workflow for getting started with ASM. A check mark
indicates that you have completed the step.
Application logs
ASM provides an activity log of user- and system-generated actions to use for troubleshooting activities.
By default, log entries display in the order they occurred.
You can view the following information:
• Severity
– — Indicates that the fatal error occurred while communicating with a managed resource;
corrective action is immediately required.
– — Indicates that the resource is in a state that requires corrective action, but does not impact
overall system health. For example, a discovered resource is not supported.
– — Indicates general information about system health or activity.
– — Indicates that the component is working as expected.
• Category
– Security — Indicates the authentication failures, operations on ASM users, operations on
credentials
– Appliance Configuration — Indicates the initial setup, appliance settings, backup and restore
– Template Configuration — Indicates the operations on Service Templates
– Network Configuration — Indicates the operations on networks, pools for MAC/IQN/WWPN/
WWNN
– Infrastructure or Hardware Configuration — Indicates the hardware discovery, inventory
– Infrastructure or Hardware Monitoring — Indicates the hardware health
– Deployment — Indicates the Service template deployment operations
– Licensing — Indicates the license updates and expirations
– Miscellaneous — Indicates all other issues
• Description — Displays brief summary of activity
• Date and Time — Indicates the time when activity occurred and time is displayed using the client
machine time zone. If there are logs, the time captured when the message is logged is based on the
appliance time.
• User — Indicates user name from which activity originated
On this page, you can:
• View log entries
129