The "LogManagement" section lets you manage logging functions. The entries in the tree structure are created automatically when the object is created. You can also generate a general report on the activity of one or several i-Box(es). This report condenses information from the log files on the Tunnels existing at the time it is generated, along with information on the breakdown of attacks.
The lower panel is not refreshed automatically. Click the green button at the lower left to update its contents.
If an entry is grayed out, the source has been deleted. In that case the entry can be deleted.
Modifying or using a Custom log format can alter or prevent creation of the report.
A Log Rotation Profile can be selected from the proposed list and configured with creation of log files:
Configuring a Profile
Every ten minutes
The blue Options button lets you create a new Log Management Profile. For example, you can choose rotation by size rather than by date.
Files can have a hash and be encrypted and/or compressed.
Log Rotation Profile
Here you can add a personalized log rotation profile.
RotationType: The criterion that will start rotation. This can be a maximum duration (By Frequency) or size (By Size).
RotationFrequency: When the type is "ByFrequency", the maximum duration of a log file before it is rotated.
Maximumfilesize(MB): when the type selected is "BySize", the maximum size of a log file (in MB) before rotation. Maximumfileretention: The number of files that are kept. The oldest file will be deleted when the threshold is reached.
Hash: Generates an MD5 or SHA1 hash of the file when it is rotated. This is a way guaranteeing the integrity of the archive.
EnableEncryption: Encrypts the file when it is rotated, using the key configured in "Password". The encryption tool used is ccrypt (Rijndael / AES encryption).
Password: The encryption key when the EnableEncryption option is selected.
EnableCompression: Compresses the file (in GZIP format) when rotated, following encryption if applicable.