12.07.2015 Views

Version 3.1 SP2 Reference Guide - Extreme Networks

Version 3.1 SP2 Reference Guide - Extreme Networks

Version 3.1 SP2 Reference Guide - Extreme Networks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Managing Virtual MachinesAction TimeActionUser NameOverall StatusTime when the VM policy was attached or detachedName of the action—Attachment of DetachmentName of user who performed the attachment or detachment operationThe operation was a Success or it FailedThe Actions window lets you filter the log information by hour or date and search for log items ordetails. It includes all the information listed in the Table view Audit Log and includes the following:Virtual MachineVirtual Port ProfileIngress PolicyEgress PolicyOverall StatusName of the virtual machineName of the virtual port profileName of the ingress policyName of the egress policySuccessful or unsuccessful validationFor more information about the Audit Log, refer to “Using the Ridgeline Audit Log” on page 429.Figure 182: VM Monitoring Audit Log248Ridgeline <strong>Reference</strong> <strong>Guide</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!