20-8
Cisco Systems IntelligentGigabit Ethernet Switch Modules for the IBMBladeCenter, Software Configuration Guide
24R9746
Chapter20 Configuring System Message Logging
Configuring System Message Logging
Enabling and Disabling Sequence Numbers in Log Messages
Because there is a chance that more than one log message ca n have the same timestamp, you can display
messages with sequence numbers so that you can unambiguously see a single message. By default,
sequence numbers in log messages are not displayed.
Beginning in privileged EXEC mode, follow these steps to enable sequence numbers in log messages:
To disable sequence numbers, use the no service sequence-numbers global configuration command.
This example shows part of a logging display with sequence numbers enabled:
000019: %SYS-5-CONFIG_I: Configured from console by vty2 (10.34.195.36)
Defining the Message Severity Level
You can limit messages displayed to the selected device by specifying the severity level of the message,
which are described in Table20-3.
Beginning in privileged EXEC mode, follow these steps to define the message severity level:
Command Purpose
Step1 configure terminal Enter global configuration mode.
Step2 service sequence-numbers Enable sequence numbers.
Step3 end Return to privileged EXEC mode.
Step4 show running-config Verify your entries.
Step5 copy running-config startup-config (Optional) Save your entries in the configuration file.
Command Purpose
Step1 configure terminal Enter global configuration mode.
Step2 logging console level Limit messages logged to the console.
By default, the console receives debugging messages and numerically
lower levels (see Table20-3 on page 20-9).
Step3 logging monitor level Limit messages logged to the terminal lines.
By default, the terminal receives debugging messages and numerically
lower levels (see Table20-3 on page 20-9).
Step4 logging trap level Limit messages logged to the syslog servers.
By default, syslog servers receive informational messages and
numerically lower levels (see Table20-3 on page 20-9).
For complete syslog server configuration steps, see the “Configuring
UNIX Syslog Servers” section on page 20-10.
Step5 end Return to privileged EXEC mode.