Solved

Cisco Unified Comm. Mgr 7.1 - how to view trace files?

Posted on 2010-11-30
2
379 Views
Last Modified: 2012-06-27
Back in Windows based 4.x Call Manager you could use Windows Explorer to c:\Program Files\Cisco\Trace\CCM and find the traces in .txt format.  But now with 7.1 you have limited access to the linux OS.  Where are the trace files located and who best to view them?  Thanks.
0
Comment
Question by:amigan_99
2 Comments
 
LVL 9

Accepted Solution

by:
Alex Bahar earned 500 total points
ID: 34247773
Trace files are not directly accessable from a shell environment or file share.

You can use RTMT to collect or view the trace files.

Please follow the instructions in the following link:
http://www.cisco.com/en/US/products/sw/voicesw/ps556/products_tech_note09186a0080094e89.shtml#calm
0
 
LVL 1

Author Closing Comment

by:amigan_99
ID: 34248719
Thank you
0

Featured Post

3 Use Cases for Connected Systems

Our Dev teams are like yours. They’re continually cranking out code for new features/bugs fixes, testing, deploying, testing some more, responding to production monitoring events and more. It’s complex. So, we thought you’d like to see what’s working for us.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The point of this post is to give you a copy/paste installation solution to setting up Asterisk 1.6 on Ubuntu 9.04 (or similar) server. # Setup the system apt-get install subversion apt-get install make apt-get install linux-source kernel-p…
Every year the snow affects people and businesses. According to the Federation of Small Businesses (FSB), in 2009, UK businesses lost an estimated £1.2bn (http://news.bbc.co.uk/1/hi/business/7864804.stm) because of bad weather. This article was c…
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

777 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question