4. Select the server, "Database and Admin services" service group and "Cisco
Role-based Security" service.
5. Set the "Debug Trace Level" field to "Debug".
6. Mark the "Trace On" checkbox.
7. Click "Save" button.
Then collect the logs using the RTMT plugin.
The log contains a file report of access/change attempts. That is, Cisco Unified Communications Manager Administration generates a record of attempts to access or modify any directory or database component through Cisco Unified Communications Manager Administration. The change record includes the user name, date, time, window from which the change was made, and the success or failure status of the update. the change was made, and the success or failure status of the update.
there are plenty of posts on this same matter so please try using the Search function of NerPro
SIP traces provide key information in troubleshooting SIP Trunks, SIP
endpoints and other SIP related issues. Even though these traces are in
clear text, these texts can be gibberish unless you understand fully
what they mean. This document attempts to br...
Please find the attached HTML document, download and open it on your PC.
This provides an easy to use form where you simply answer a few
questions and it will render the proper jabber-config.xml file for you
to copy/paste. There is built in logic to verif...
CUCM Database Replication is an area in which Cisco customers and
partners have asked for more in-depth training in being able to properly
assess a replication problem and potentially resolve an issue without
involving TAC. This document discusses the bas...