Entering content frame

Background documentation Logging and Tracing

Logging and Trace Files

The following files are available for logging important security events and helping administrators with troubleshooting:

·        Security Logging

Location in Log Viewer: ./log/system/Security/Audit/defaultLog.log

Location in file system: <drive>:\usr\sap\<SID>\<instance_number>\j2ee\cluster\server0\log\system\Security\Audit\defaultLog.log

This file contains a log of important security events, such as successful and failed user logons, and creation or modification of users, groups and roles. For a complete list of events that are logged and the format in which they are logged, see Structure linkWhat is Logged?.

·        Log Files

Location in Log Viewer: ./log/system/Security/Usermanagement/defaultLog.log

Location in file system: <drive>:\usr\sap\<SID>\<instance_number>\j2ee\cluster\server0\log\system\Security\Usermanagement\defaultLog.log

This file contains logging information for UME Libraries and the UME Provider (com.sap.security.core.ume.service) and can be used by the J2EE Engine system administrator who is responsible for monitoring the server status. If an error occurs, the information in this file can help to find out what the problem is.

·        Trace Files

Location in Log Viewer: ./log/defaultTrace.trc

Location in file system: <drive>:\usr\sap\<SID>\<instance_number>\j2ee\cluster\server0\log\defaultTrace.trc

This file contains all the trace information for the whole server and includes trace information for UME libraries and the UME Provider (com.sap.security.core.ume.service). The information in this file is on a very fine-granular level and includes exceptions, warnings, and debugging information. It is mainly required by the SAP support team.

Viewing Logging and Trace Files in the Log Viewer

...

       1.      In the Visual Administrator, choose Cluster ® Server ® Services ® LogViewer.

       2.      Make sure the Runtime tab is displayed.

       3.      In the navigation tree, choose Server and navigate to the required file.

Configuring the Log Viewer

You can change the severity level of logging and tracing using the log configuration services in the Visual Administrator.

...

       1.      In the Visual Administrator, choose Cluster ® Server ® Services ® Log Configurator.    

       2.      Choose the configuration you want to change.

¡        For security logging, choose Categories ® Root Category ® System ® Security ® Audit.

¡        For user management logging, choose Categories ® Root Category ® System ® Security ® Usermanagement.

¡        For tracing, switch to advanced mode and choose Locations ® Root location ® com ® sap ® security.

       3.      Change the severity level as required.

                            a.      Select the required package and choose Edit.

                            b.      Under Severity change the severity settings.

The new severity level will be activated immediately. You do not have to restart the server.

Configuring Security Logging

You can also configure security logging with the following UME properties:

Property

Value

Description

ume.secaudit.log_actor

Default value is TRUE.

FALSE = Actor of event is not logged.

Defines whether the actor of an event is written to the log file.

ume.secaudit.
get_object_name

Default value is FALSE.

Defines whether the display name of an object is written to the log file in addition to the object ID.

Only the object names of users, groups, UME roles, and user accounts can be displayed. Object names of other objects are not available.

 

Leaving content frame