Parameter

Description

 

 

Delay X hours

The number of hours between uploads of data to the file.

between uploads.

 

 

 

Upload every X

The number of minutes between attempts to upload data to the file after an upload

minutes

failure.

 

 

Up to X times

The maximum number of times the upload will be attempted after an initial failure.

 

 

Until Upload

Attempt to upload the file until the transfer is completed.

Succeeds

 

 

 

To resize the data log (Logs > Data > size):

By default, the data log stores 400 events. You can change the number of data points the log stores. When you resize the data log, all existing log entries are deleted. To avoid losing log data, use FTP or SCP to retrieve the log before you enter a new value in the Data Log Size field.

See “How to use FTP or SCP to retrieve log files” on page 47.

When the log is full, older entries are deleted.

How to use FTP or SCP to retrieve log files

An Administrator or Device User can use FTP or SCP to retrieve a tab-delineated event log file (event.csv) or data log file (data.csv) and import it into a spreadsheet.

The file reports all events or data recorded since the log was last deleted or (for the data log) truncated because it reached maximum size.

The file includes information that the event log or data log does not display.

The version of the file format (first field)

The date and time the file was retrieved

The Name, Contact, and Location values and IP address of the Management Card

The unique Event Code for each recorded event (event.csv file only)

Note: The Management Card uses a four-digit year for log entries. You may need to select a four-digit date format in your spreadsheet application to display all four digits.

If you are using the encryption-based security protocols for your system, use SCP to retrieve the log file.

If you are using unencrypted authentication methods for the security of your system, use FTP to retrieve the log file.

See the Security Handbook, available on the Network Management Card Utility CD and on the APC Web site (www.apc.com) for information on available protocols and methods for setting up the type of security you need.

47

Network Management Card User’s Guide

Page 56
Image 56
Schneider Electric AP9635 manual How to use FTP or SCP to retrieve log files