Scenario: A NetScaler Engineer is troubleshooting an issue and using /var/log/ns.log to view the errors.
The logs are being filled with messages like the ones below:
Oct 6 14:03:23 <local0.info> 192.168.10.50 10/06/2014:14:03:23 GMT ns1 0-PPE-0 : TCP CONN_DELINK 4471 0 : Source 192.168.10.10:52187 – Vserver 192.168.10.50:80 – NatIP 192.168.10.10:52187 – Destination 192.168.10.50:80 – Delink Time 10/06/2014:14:03:23 GMT – Total_bytes_send 1075 – Total_bytes_recv 352
Oct 6 14:03:30 <local0.info> 192.168.10.50 10/06/2014:14:03:30 GMT ns1 0-PPE-0 : TCP CONN_TERMINATE 4472 0 : Source 192.168.10.35:80 – Destination 192.168.10.51:35341 – Start Time 10/06/2014:14:02:43 GMT – End Time 10/06/2014:14:03:30 GMT – Total_bytes_send 1 – Total_bytes_recv 1
Oct 6 14:03:30 <local0.info> 192.168.10.50 10/06/2014:14:03:30 GMT ns1 0-PPE-0 : TCP CONN_TERMINATE 4473 0 : Source 127.0.0.1:7776 – Destination 127.0.0.2:55623 – Start Time 10/06/2014:14:02:45 GMT – End Time 10/06/2014:14:03:30 GMT – Total_bytes_send 1 – Total_bytes_recv 1
Oct 6 14:03:30 <local0.info> 192.168.10.50 10/06/2014:14:03:30 GMT ns1 0-PPE-0 : TCP CONN_TERMINATE 4474 0 : Source 127.0.0.1:80 – Destination 127.0.0.2:39771 – Start Time 10/06/2014:14:02:46 GMT – End Time 10/06/2014:14:03:30 GMT – Total_bytes_send 1 – Total_bytes_recv 1
Which option should the engineer modify to stop these types of messages from getting logged in /var/log/ns.log?
A. ACL logging in the nslog parameters
B. ACL logging in the syslog parameters
C. TCP logging in the nslog parameters
D. TCP logging in the syslog parameters