Nsslapd-accesslog-level (access log level), Nsslapd-accesslog-list (list of access log files), Nsslapd-accesslog-logbuffering (log buffering) – Red Hat 8.1 User Manual
Page 18
Table 2.2. dse.ldif File Attributes
Attribute
Value
Logging enabled or disabled
nsslapd-accesslog-logging-
enabled
nsslapd-accesslog
on
empty string
Disabled
nsslapd-accesslog-logging-
enabled
nsslapd-accesslog
on
filename
Enabled
nsslapd-accesslog-logging-
enabled
nsslapd-accesslog
off
empty string
Disabled
nsslapd-accesslog-logging-
enabled
nsslapd-accesslog
off
filename
Disabled
Parameter
Description
Entry DN
cn=config
Valid Values
Any valid filename.
Default Value
/var/log/dirsrv/slapd-instance_name/access
Syntax
DirectoryString
Example
nsslapd-accesslog:
/var/log/dirsrv/slapd-instance_name/access
2.3.1.2. nsslapd-accesslog-level (Access Log Level)
This attribute controls what is logged to the access log.
Parameter
Description
Entry DN
cn=config
Valid Values
0 - No access logging
4 - Logging for internal access operations
256 - Logging for connections, operations,
and results
512 - Logging for access to an entry and
referrals
131072 - Provides microsecond operation
timing
These values can be added together to
provide the exact type of logging required; for
example, 516 (4 + 512) to obtain internal
access operation, entry access, and referral
logging.
Default Value
256
Syntax
Integer
Example
nsslapd-accesslog-level: 256
2.3.1.3. nsslapd-accesslog-list (List of Access Log Files)
This read-only attribute, which cannot be set, provides a list of access log files used in access log
rotation.
Parameter
Description
Entry DN
cn=config
Valid Values
Default Value
None
Syntax
DirectoryString
Example
nsslapd-accesslog-list: accesslog2,accesslog3
2.3.1.4 . nsslapd-accesslog-logbuffering (Log Buffering)
When set to off, the server writes all access log entries directly to disk. Buffering allows the server to
use access logging even when under a heavy load without impacting performance. However, when
debugging, it is sometimes useful to disable buffering in order to see the operations and their results
18
Chapter 2. Core Server Configuration Reference