Message event logging

The contents of log files can be useful sources of information when you monitor or troubleshoot ISAM servers.

We can use log files to capture any Security Verify Access message.

When relevant, the distinctions between these methods are mentioned.

Use the statements within routing files to control which messages to log, the location of the log files, and format of the messages. Use the information in this chapter to learn the configuration syntax used in the routing files and defines the default file name and location of the message log files. The directory location for message log files can be different, depending on whether Tivoli Common Directory is configured.

Parent topic: Troubleshoot