User's Manual

Security
Advanced Tuning of the Daemon C-5
The following tokens can appear in the log file template and will be replaced
accordingly:
%A: workspace name
%D: date (yymmdd)
%I: instance number of the given workspace server
%L: server account login directory
%P: server process ID
%T: time (hhmmss)
%U: server account name (username)
For example, %L/server_%A%I.log may produce a log file such as:
/usr/smith/server_sales15.log.
The default log file template is %L/server_%A%I.log.
Security
The following Security tab for the daemon is used to:
Grant administration rights for the daemon.
Tracing and debug options
Daemon RPC function calls Select this to log all daemon RPC function calls.
Log ACX Select this if you want to log requests and processes.
Extended RPC trace Generates a verbose message in the server log file for each
low-level RPC function called. This is useful for
troubleshooting the server.
System trace
Generates system-specific tracing of various operations.
Timing
Generates a timestamp for every entry to the server log
file.
Sockets Generates a message in the server log file for each socket
operation.
Trace information Select this to log low-level RPC operations.
No timeout Disables the standard RPC timeouts, setting them to a long
duration (approximately an hour) to facilitate debugging.
Call trace
Generates a message in the server log file for each RPC
function called. This is useful for troubleshooting the
server.
RPC trace
Enables debugging messages on the server.
Binary XML log level Sets the binary XML log level. Your options are:
debug
none (the default)
api
info
Table 8–9 (Cont.) Daemon Logging Tab Components
Field Description