Tracing and Logging Settings

Enables you to configure the Consolidated Tracing Facility (CTF), its verbosity and the options it applies to.
Enable Tracing
Create a Consolidated Tracing Facility (CTF) trace file which will provide low level technical logging for debugging issues.
Use Binary Format
The trace file will be created as a compressed binary file, which can be viewed using the CTF Viewer.
Trace Level
The level of trace output to generate:
  • Debug
  • Info
  • Warning
  • Error
  • Fatal
File Name
The CTF trace file will be created with the location and name provided. If only a file name is provided, it will be created in the default mftrace folder location C:\ProgramData\Micro Focus\Enterprise Developer\product_version\mftrace\logs.

Enable Tracing for:

Configuration
Enable tracing for when changes are made to the configuration file of ESCWA.
JSON Parsing and Serialization
Enable tracing for ESCWA's use of JSON objects.
Communications
Enable tracing for network communications between ESCWA and other components.
Session
Enable tracing for user sessions in ESCWA.
ESF
Enable tracing for the External Security Facility (ESF) usage in ESCWA.
Vault
Enable tracing for the Secrets Vault in use by ESCWA.
Audit
Enable tracing for auditing in ESCWA.
Log Directory
The directory to which the server log (log.html) will be saved. The specified directory must already exist. By default, this is located in C:\ProgramData\Micro Focus\Enterprise Developer\ESCWA\log.html.
Show Log
Click this to display the Micro Focus ES Communications Process Message Log.
Log Max File Size
The maximum size of the server log (log.html) that will be saved. Once the specified size has been reached a new file will be started. If set to 0 the file will grow without bound. The default file size is 1024kB.
Log File Count
The number of old server logs (log.html) that will be saved. Once reached the oldest file will be deleted and reused. The default log file count is 5.
Enable Auditing
Enable Auditing for ESCWA. ESCWA will collect information on security related events and preserve them for later review. Enterprise Server Auditing must be setup for this to take effect.
Note: See Enterprise Server Auditing for more information.