!--a11y-->
Logging and TracingThe following files are available for logging important security events and helping administrators with troubleshooting:
· Security Logging
Location in Log Viewer: ./log/system/Security/Audit/defaultLog.log
Location in file system: <drive>:\usr\sap\<SID>\<instance_number>\j2ee\cluster\server0\log\system\Security\Audit\defaultLog.log
This file
contains a log of important security events, such as successful and failed
user logons, and creation or modification of users, groups and roles. For a
complete list of events that are logged and the format in which they are
logged, see
What is
Logged?.
· Log Files
Location in Log Viewer: ./log/system/Security/Usermanagement/defaultLog.log
Location in file system: <drive>:\usr\sap\<SID>\<instance_number>\j2ee\cluster\server0\log\system\Security\Usermanagement\defaultLog.log
This file contains logging information for UME Libraries and the UME Provider (com.sap.security.core.ume.service) and can be used by the J2EE Engine system administrator who is responsible for monitoring the server status. If an error occurs, the information in this file can help to find out what the problem is.
· Trace Files
Location in Log Viewer: ./log/defaultTrace.trc
Location in file system: <drive>:\usr\sap\<SID>\<instance_number>\j2ee\cluster\server0\log\defaultTrace.trc
This file contains all the trace information for the whole server and includes trace information for UME libraries and the UME Provider (com.sap.security.core.ume.service). The information in this file is on a very fine-granular level and includes exceptions, warnings, and debugging information. It is mainly required by the SAP support team.
...
1. In the Visual Administrator, choose Cluster ® Server ® Services ® LogViewer.
2. Make sure the Runtime tab is displayed.
3. In the navigation tree, choose Server and navigate to the required file.
You can change the severity level of logging and tracing using the log configuration services in the Visual Administrator.
...
1. In the Visual Administrator, choose Cluster ® Server ® Services ® Log Configurator.
2. Choose the configuration you want to change.
¡ For security logging, choose Categories ® Root Category ® System ® Security ® Audit.
¡ For user management logging, choose Categories ® Root Category ® System ® Security ® Usermanagement.
¡ For tracing, switch to advanced mode and choose Locations ® Root location ® com ® sap ® security.
3. Change the severity level as required.
a. Select the required package and choose Edit.
b. Under Severity change the severity settings.
The new severity level will be activated immediately. You do not have to restart the server.
You can also configure security logging with the following UME properties:
Property |
Value |
Description |
ume.secaudit.log_actor |
Default value is TRUE. FALSE = Actor of event is not logged. |
Defines whether the actor of an event is written to the log file. |
ume.secaudit. |
Default value is FALSE. |
Defines whether the display name of an object is written to the log file in addition to the object ID. Only the object names of users, groups, UME roles, and user accounts can be displayed. Object names of other objects are not available. |
