Configuration and log management: The configuration management feature in 9.7 enables users to configure notification and system logging services.
配置和日志管理:9.7中的配置管理功能使用户能够配置通知和系统日志服务。
This is useful in the integration with existing legacy system monitoring tools that offer continuous scanning of log files in order to raise alerts and detect incidents.
这在集成已有遗留系统监测工具时很有用处,这些工具提供了对日志文件的连续扫描功能以产生警告并监测事故。
Users first must log in to access the system; they can then view the client list and details about each client.
用户首先必须登录以访问系统;然后他们能浏览客户列表和每个客户的详细信息。
Depending on your requirements, you have to balance the benefit of faster audit log queries with a potential penalty in overall system performance.
根据您的需求条件,可能需要平衡使用整个系统性能的损失与更快的审核日志查询。
After the log records pertaining to older schema no longer exist in the system, the shadow replicate is automatically deleted and system only has new master replicates.
当系统中不再存在属于旧模式的日志记录时,影子复制将被自动删除,系统中就只有新的主复制。
When the boot process finishes, you can log in as root in the system and create normal user accounts.
引导过程结束时,您可作为系统的根用户登录,创建普通用户账户。
When the database is initialized, the system allocates a certain number of primary log files of a specified size in the active log directory.
当初始化数据库时,系统会在活动日志目录中分配一定数量、指定大小的主日志文件。
Problem: Cannot log in to the system with LDAP user...
问题:无法使用LDAP用户登录系统……
Another new appearance in this quadrant, but in the Trial zone, is Splunk, a log file analyzer useful to system administrators.
该象限中的另一个新兵是Splunk(但它位于试用分组当中),这是一个日志文件分析器,对于系统管理员很有帮助。
Put a message in the errpt log and purge old errors from the system.
在errpt日志中添加消息和从系统中清除老错误。
Once you have the base operating system installed and it has successfully booted, log in and configure Apache, PHP, and MySQL using the techniques discussed in Part 4.
安装基本操作系统并成功地启动它之后,使用第4部分中讨论的技术登录并配置Apache、PHP和MySQL。
After the system has started up for the first time, log in as root and create a directory called SRC for the installation files used in the next section.
首次启动系统后,以根用户登录,并且为在下一节用到的安装文件创建名为src的目录。
The first log-structured file system was proposed by John Ousterhout and Fred Douglis in 1988 and subsequently implemented in the Sprite operating system in 1992.
第一个日志结构文件系统由John Ousterhout和Fred Douglis在 1988 年提出,随后由Sprite操作系统在 1992 年实现。
Cannot log in to the system with LDAP user after successful Directory Server configuration.
在成功配置DirectoryServer后,无法使用LDAP用户登录系统。
The data in this log contains information about the devices connected to the system and any faults and problems recorded by the system during the boot and operational process.
此日志中的数据包含关于连接到系统的设备的信息,以及在启动和操作过程中系统记录的任何错误和问题的信息。
Users can filter the system log file contents and view them, or users can view the entire log content in a browser.
用户可以过滤系统日志文件内容并查看它们,或者可以在浏览器中查看整个日志内容。
Cleaning up log files so that system or user information is not available in the logs.
清除日志文件,以便系统或用户信息不会出现在日志中。
The target service received each invocation and logged the contents of the business object to the system log as shown in Listing 5.
目标服务接收每次调用,并将业务对象的内容记录到系统日志中,如清单5 中所示。
Still, this has the system allowing users to log in under their own names, which is enough to let them post notes.
尽管如此,这使得系统允许用户使用他们自己的用户名登录,对于让用户添加记录来说就足够了。
Create the database and move the logs to the log file system using the commands in Listing 8.
使用清单8所列的命令创建数据库,并将日志移动到日志文件系统。
Registered users can log in to the system using a login page.
已注册用户可以使用登录页面登录到系统。
The log displays in the system editor, as shown in Figure 16.
该日志将显示在系统编辑器中,如图16所示。
A successful invocation simply outputs the attributes to the system log in the Console view (Figure 6).
成功调用后,会将属性直接输出到控制台视图中的系统日志(图6)。
In case the primary system fails, the continuous log restore feature makes a secondary system available to replace the primary system.
当主系统出故障时,连续日志恢复特性使一个辅助系统可用,以替代主系统。
In the event of a system failure, transaction log recovery can apply or undo only those transactions not written to disk at the time of the failure.
在系统失败时,事务日志可以应用或取消失败时没有写入磁盘的那些事务。
Check the system log for the status messages of our service implementations as shown in Figure 15.
核查系统日志,获得服务实现的状态消息,如图15所示。
When executing the connect statement, no user and password were given so that the connection was established with the username that was used to log in to the operating system.
在执行connect语句时,没有提供用户名和密码,因此使用登录操作系统所用的用户名建立连接。
A typical audit log file on my system is shown in Listing 1; it shows the trail record, as well.
关于系统上典型的审计日志文件,参见清单1;它还显示了记录的追踪部分。
One way to avoid this problem is to never log in to the system as the root user (see the Logging in as root section).
避免这个问题的方法之一是,不要以root用户登录到系统中(请参见以root用户登录部分)。
Now, instead of going through the entire process of having to run telnet to connect to the remote system, log in with your username and password, run the command(s) on that system, and then log out.
现在,对于整个执行过程,不再需要运行telnet连接到远程系统,使用您的用户名和密码进行登录,在该系统上运行这些命令,然后注销。
应用推荐