Solved

Command "logging persistent size .... "

Posted on 2016-11-03
6
28 Views
Last Modified: 2016-11-04
Hi Anyone can explain the difference between below commands in asr1k? Thank you in advance

logging persistent url harddisk:/syslog size 10000000 filesize 1000000

logging persistent size 10000000 filesize 1000000
0
Comment
Question by:eemoon
  • 3
  • 3
6 Comments
 
LVL 13

Expert Comment

by:SIM50
ID: 41874030
Both commands enable saving messages to a disk. The difference is that one specifies where to save them and the other doesn't.
0
 

Author Comment

by:eemoon
ID: 41874088
Thank you so much for your fast reply. But the first one uses "syslog", does that means the same thing with logging?
0
 
LVL 13

Expert Comment

by:SIM50
ID: 41874104
syslog is just the name of the directory where to save logs.
logging persistent url disk0:/syslog size 10000000 filesize 1000000
0
IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

 

Author Comment

by:eemoon
ID: 41874226
You are right. Thank you so much. why do we use url in the command "logging persistent url disk0:/syslog size 10000000 filesize 1000000"?
and where is the saving location for the command "logging persistent size 10000000 filesize 1000000"?
0
 
LVL 13

Accepted Solution

by:
SIM50 earned 500 total points
ID: 41874257
why do we use url in the command "logging persistent url disk0:/syslog size 10000000 filesize 1000000"?
This questions is probably best answered by Cisco IOS developers why they choose this specific keyword.

and where is the saving location for the command "logging persistent size 10000000 filesize 1000000"?
Just tested it on my ASR. If you don't specify the location, it saved my logs to flash:/bootflash/syslog

Edit: Changed tags for your question.
0
 

Author Comment

by:eemoon
ID: 41874295
Great! Thank you so much
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Problem Description:   Couple of months ago we upgraded the ADSL line at our branch office from Home to Business line. The purpose of transforming the service to have static public IP’s. We were in need for public IP’s to publish our web resour…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now