The viewer provides the ability to structure text based on text matching relationships. The viewer will work best with structured files, in which each text line is surrounded by lines which add context to the line being viewed. These file types will almost always be chronological and single thread based. Where more than one thread of activity can occur in parallel the context of a line of text could be lost.

Examples of structured files are Novell Identify Manager / DirXML driver traces, NetWare Abend logs, NetWare system or console logs and DSBrowse high value count output. There are many, many other logs files which would be suite for viewing using this utility.

An example of a log file which is not suited to any viewer is DSTRACE.LOG when using multiple eDirectory trace filters. (IDM/DirXML output is chronological and single threaded.)

There are a number of rules included with the utility by default. They are by no means perfect, but provide some ideas on how a file might be displayed.

Examples provided:

    DSBrowse High Value Count
    DSrepair DIB Repair

The utility is provided as-is, Novell is not bound to provide bugs fixes or enhancements and does not make any claims about the accuracy of this tool.

A PDF manual is provided with the installation. 3DLogViewerManual.pdf

Share profile rule files, each profile is saved in a CSV file under the application RULES directory.

In cases like IDM/DirXML it is not possible to create rules which are perfect, so various drivers will display differently.

0 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 50 votes, average: 0.00 out of 5 (0 votes, average: 0.00 out of 5)
You need to be a registered member to rate this post.
Categories: eDirectory

Disclaimer: As with everything else at NetIQ Cool Solutions, this content is definitely not supported by NetIQ, so Customer Support will not be able to help you if it has any adverse effect on your environment.  It just worked for at least one person, and perhaps it will be useful for you too.  Be sure to test in a non-production environment.

Leave a Reply

No Comments
By: lbartlett
Aug 6, 2007
3:51 pm
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow