Transaction Log Files

The transaction logs consist of:
aa813test
2115380
The transaction logs consist of:
CA Risk Authentication Server Log
CA Risk Authentication records all requests processed by the server and related actions in the arcotriskfort.log file. The default location of this file is:
On Microsoft Windows:
<
install_location
>\Arcot Systems\
logs
\
On UNIX-Based Platforms:
<
install_location
>/arcot/
logs
/
You cannot use the CA Risk Authentication logger to configure your application’s logs. You can access these logs by using the tool used by the third-party application server (such as Apache Tomcat or IBM Websphere) that is hosting your application.
All logging-related parameters can be configured by using Administration Console. To do so, you must use the instance-specific configuration page that you can access by clicking the required instance in the
Instance Management
page.
In addition to the log file path, the maximum log file size (in bytes), backup directory, logging level, and timestamp information, you can also control whether you want to enable trace logging. See "Format of the CA Risk Authentication Server and Case Management Server Log Files" for details of the default format used in the file.
Case Management Server Log File
When you deploy the Case Management Server module and subsequently start it, the details of all its actions and processed requests are recorded in the arcotriskfortcasemgmtserver.log file. The default location of this file is:
On Microsoft Windows:
<
install_location
>\Arcot Systems\
logs
\
On UNIX-Based Platforms:
<
install_location
>/arcot/
logs
/
You cannot use the CA Risk Authentication logger to configure your application’s logs. You can access these logs by using the tool used by the third-party application server (such as Apache Tomcat or IBM Websphere) that is hosting your application.
All logging-related parameters (specified under the [arcot/riskfortcasemgmtserver/logger] section) can be configured by using Administration Console. To do so, you must use the instance-specific configuration page that you can access by clicking the required instance in the
Instance Management
page.
In addition to the log file path, the maximum log file size (in bytes), backup directory, logging level, and timestamp information, you can also control whether you want to enable trace logging. See "Format of the CA Risk Authentication Server and Case Management Server Log Files" for the details of the default format used in the file.