| Table |
|
|
Reference | Description |
I | If you enter “h” in response to “action?”, Help for the action appears. |
| If you specify an activity log number, you jump to the log number. |
| If you specify the time, you jump to the oldest log after the specified time. |
| The log with the display of “XXX log was collected.” has a link to the detailed log. |
| The operations listed below are available to the log: |
| If you enter “d <nnnn>”, hexadecimal dump output of the detailed log is done. |
| If you enter “f <nnnn>”, the detailed log is uploaded to the FTP server. |
| If you enter “a <nnnn>”, the result of the analysis of the detailed log with analyzing |
| program is displayed. The detailed logs with program analysis are as follows: |
| HW fatal, HW recoverable, processor MCA, iSP snapshot. |
|
|
J | If you enter “q” in response to “action?”, the display exits from the log display. |
|
|