InRow RC/RD/RP (600 mm) User’s Guide24
Logs

Events

Log

Use this option to view or delete the contents of the event log. The event log displays all events recorded
since the log was last deleted or since the log reached its maximum capacity and the older half was
deleted automatically. Events are listed in reverse chronological order. By default, all events are logged:
You can view the event log as a page of the Web interface (the default view) or click Launch Log
in New Window from that page to display a full-screen view of the log, enabling you to see more
of the listed events without scrolling.
• To delete all events recorded in the log, click Clear Event Log on the Web page that displays the
log. Deleted events cannot be retrieved.
To disable the logging of events based on their assigned severity level or their event category, configure
event actions by group.
To access lists of all configurable events and how they are currently configured, select the
Administration tab, Notification on the top menu bar, and by event under Event Actions on the left
navigation menu; then click, in turn, on each major category of event.

Reverse lookup

Reverse lookup is disabled by default. Enable this feature unless you have no DNS server configured or
have poor network performance because of heavy network traffic.
With reverse lookup enabled, when a network-related event occurs, both the IP address and the domain
name for the networked device associated with the event are logged in the event log. If no domain name
entry exists for the device, only its IP address is logged with the event. Since domain names generally
change much less frequently than IP addresses, enabling reverse lookup can improve the ability to
identify addresses of networked devices that are causing events to occur.
Note: If your browser is Microsoft Internet Explorer, JavaScript must be enabled for
you to use the Launch Log in New Window button.
Alternatively, you can use FTP or Secure CoPy (SCP) to view the event log. See “How
to use FTP or SCP to retrieve the log files” on page30.
See “Configuring by group” on page51.
See “Configuring by event” on page49.