Enables you to configure the Consolidated Tracing Facility (CTF), its verbosity and the options it applies to.
- Enable Tracing
- Create a Consolidated Tracing Facility (CTF) trace file which will provide low level technical logging for debugging issues.
- Use Binary Format
- The trace file will be created as a compressed binary file, which can be viewed using the CTF Viewer.
- Trace Level
- The level of trace output to generate:
- Debug
- Info
- Warning
- Error
- Fatal
- File Name
- The CTF trace file will be created with the location and name provided. If only a file name is provided, it will be created
in the default
mftrace folder location
.
On UNIX it is created in the working directory of the process.
Enable Tracing for:
- Configuration
- Enable tracing for when changes are made to the configuration file of
ESCWA.
- JSON Parsing and Serialization
- Enable tracing for
ESCWA's use of JSON objects.
- Communications
- Enable tracing for network communications between
ESCWA and other components.
- Session
- Enable tracing for user sessions in
ESCWA.
- ESF
- Enable tracing for the External Security Facility (ESF) usage in
ESCWA.
- Vault
- Enable tracing for the Secrets Vault in use by
ESCWA.
- Audit
- Enable tracing for auditing in
ESCWA.
- Log Directory
- The directory to which the server log (log.html) will be saved. The specified directory must already exist. By default, this is located in
/var/mfcobol/logs/escwa.
- Show Log
- Click this to display the Micro Focus ES Communications Process Message Log.
- Log Max File Size
- The maximum size of the server log (log.html) that will be saved. Once the specified size has been reached a new file will be started. If set to 0 the file will grow
without bound. The default file size is 1024kB.
- Log File Count
- The number of old server logs (log.html) that will be saved. Once reached the oldest file will be deleted and reused. The default log file count is 5.
- Log User Authorization
- Check this to log when users fail to authorize. This log information will be added to the server log (log.html).
Note: When enabled, this can log significant amounts of information.
- Enable Auditing
- Enable Auditing for
ESCWA.
ESCWA will collect information on security related events and preserve them for later review. Enterprise Server Auditing must be
setup for this to take effect.
Note: See
Enterprise Server Auditing for more information.
- Audit Request Bodies
- Check this to enable auditing of request bodies. See
Audit Event Codes for more information.
Note: Enable Auditing must be checked for this option to take effect. This option significantly increases the amount of data that
ESCWA will emit.