Log windows

Log windows show trace information from computers, which have logging enabled.

You can have more than one log window open. All log messages are sent to all log windows.

Each message is displayed on a single line and has the following fields:

Field

Description

Severity

The severity of the message. Can be:

D = Display

C = Critical error

E = Error

I = Information

T = Trace

The message on the Monitor screen will be colored according to the severity of the message.

Computer

The short name of the computer on which the server that has generated the message runs.

Date

The date the message was generated. Date and time reflect the global coordinated time of the event, allowing control of servers in multiple time zones.

Time

The time the message was generated. Date and time reflect the global coordinated time of the event, allowing control of servers in multiple time zones.

Server

The name of the server (component) that has generated the message.

Cause

In case of an error condition, the cause that has generated the message. The cause field consists of one or more characters, each specifying a cause. The leftmost character is the most probable cause, other causes follow in descending probability. One message can thus be generated because of a database error, or less probably because of a network error. For a complete description of possible causes, see the FraudOne - Administrator's Guide or the listing in your Monitor filter rule setup.

Message

The actual message. Customer relevant messages contain a message identifier that can be used to look up information on the message. The Server Monitor is able to display that information if the message is double clicked.

 

 

You can display only selected information in each log window by configuring a filter for it (see Using filters). Thus you can, for instance, display all database error messages in one window, or group all messages for a specific task in another.

Information scrolling in a log window can be paused (see Creating and using log windows).

Log information can be copied to the clipboard and used in another application. You can select the log lines you want and copy them. If no lines are selected, all the log information is copied. Thus, it becomes easy to select the relevant information and mail it to support personnel.

See also Viewing log information and Logging.