About logs

Your system can generate various logs that shows the activity on system functionality. The following log types are available in your system:

Name

Description

Management Application log files

Shows Management Application activity. The system creates a new log file for every day you use the Management Application.

You cannot disable this type of logging. Management Application log files are named according to the structure AdminYYYYMMDD.log, for example Admin20091231.log.

Recording Server service log files

Shows Recording Server service activity. A new log file is created for each day this service is used.

You cannot disable this type of logging. Recording Server service log files are named according to the structure RecordingServerYYYYMMDD.log, for example RecordingServer20091231.log.

Image Server service log files

Shows Image Server service activity. A new log file is created for each day the service is used.

You cannot disable this type of logging. Image Server service log files are named according to the structure ISLog_YYYYMMDD.log, for example ISLog_20091231.log.

Image Import service log files

Shows Image Import service activity, when this service is used for fetching pre-alarm images, and storing the fetched images in camera databases.

Pre-alarm images is a feature available for selected cameras only. It enables sending of images from immediately before an event took place from the camera to the surveillance system via e-mail. A new log file is created for each day the service is used.

You cannot disable this type of logging. Image Import service log files are named according to the structure ImageImportLog_YYYMMDD.log, for example ImageImportLog20091231.log.

Event log files

Shows registered events' activity. A new log file is created for each day on which events occur.

You cannot disable this type of logging. Event log files should be viewed using XProtect Smart Client (use the Playback tab's Alerts section).

Audit log files

Shows XProtect Smart Client user activity (if audit logging is enabled).

A new log file is created for each day with audit logging enabled and client user activity. Audit log files are named according to the structure is_auditYYYMMDD.log, for example is_audit20091231.log. The _is prefix is due to the fact that the audit log files are generated by the Image Server service.

Log locations

All log files are by default placed in the appropriate All Users folder for the operating system you are using. By default, they are stored there for seven days. Note that you can change log file locations as well as the number of days to store the logs when you configure logging.

Log structures

Most log files generated by your system use a shared structure complying with the W3C Extended Log File Format. Each log file consists of a header and a number of log lines:

Log integrity checks

All log files, except Management Application log files, are subjected to an integrity check once every 24 hours. The integrity check is performed by your system's Log Check service. The result of the integrity check is automatically written to a file named according to the structure LogCheck_YYYYMMDD.log, for example LogCheck_20091231.log. Like the log files themselves, the log check files are by default placed in the appropriate All Users folder for the operating system you are using.

Any inconsistencies are reported in the form of error messages written in the log check file.

Possible error messages:

Name

Description

Log integrity information was not found. Log integrity can't be guaranteed.

The log file could not be checked for integrity.

Log information does not match integrity information. Log integrity can't be guaranteed.

The log file exists, but does not contain the expected information. Log integrity cannot be guaranteed.

[Log file name] not found

The log file was not present.

[Log file name] is empty

The log file was present, but empty.

Last line changed/removed in [log file name]

The last line of the log file did not match the validation criteria.

Encrypted data missing in [log file name] near line [#]

The encrypted part of the relevant log line was not present.

Inconsistency found in [log file name] near line [#]

The log line does not match the encrypted part.

Inconsistency found in [log file name] at beginning of log file

The log file header is not correct. This situation is most likely to occur if a user has attempted to delete the beginning of a log file.

Note: Other messages that are not error-related may also appear in the log check file.

© 2019 Milestone Systems A/S