Go to documentation repository
Page History
The system log is a log containing system information on events, including system error entries.
The system System log is stored in a the local database for each server by default. You can set access to the system log for a user group in the the Users tab under of the Settings tab (see the section titled Configuring user permissions Roles).
By default, metadata Metadata files are stored in Server's metadata database: C:\ProgramFiles\AxxonSoft\AxxonOne\Metadata\vmda_db\VMDA_DB.0\vmda_schema; if in the metadata storage in the local directory of the server. The metadata storage path is set during the Axxon One installation(see Installation). If necessary, you can place them on any available metadata in the network storage.
To configure the data storage of the system log and metadata, do the following:
- Go to Settings → Options
- Options → Data storage (1-2)
- .
In the Settings of system log storage section:
In the Period field, enter the
storage period of
the system log in the
server database. The maximum
allowable value is 1000 days.
Note title Attention! If you enter
- System Log events will be stored 0 days. Metadata retention time becomes unlimited
the 0 value, the system log events are stored for 0 days.
- In the System log cleanup period field, enter the system log cleanup period for irrelevant events in hours. The events are considered irrelevant if their storage period in the system log exceeds the set one on the previous step.
In the Settings of metadata storage section:
- In the Period field, enter the metadata storage period in the metadata storage in days. The maximum allowable value is 1000 days.
Note title Attention! - If you
- enter the 0 value, there is no limit to the depth of the metadata in the database.
- If the free space on the disc becomes less than 15 GB
- ,
- the metadata
- storage is overwritten
- , that is, the new data
- is recorded over the oldest
In the appropriate field, enter the amount of hours after which outdated events will be purged from the system log (4).
Outdated events are events that have been stored in the system log for a period greater than that indicated in step 2.
Info title Note - one (see General information about the self-diagnostics service).
- The cleanup of the metadata storage from videos, the storage period of which exceeds the set one, is performed:
- Each
The metadata database is purged of video recordings that have been stored for more than the specified storage period:
Every- 12 hours after Axxon One
- starts.
- Each time when you start
- searching in the archive (see
- If there is no recording by a camera to the archive during the metadata storage cleanup, the
- data of this camera is stored in the database regardless of the date.
- If necessaty, you can the database in the network storage
- (by default,
- the metadata storage is
- placed locally, the path is set during the installation, see Installation).
- In the Network path to save metadata field, specify the
Enter a - path to the network
destination for metadata database (5). - storage where the database must be placed.
Note title Attention! - At the end of the network path, you must specify the character of the closingslash (\). Otherwise, the network path is considered incorrect, and the metadata recording isn't performed. The example of the correct network path: \\192.168.1.111\my_metadata_folder\
- storage where the database must be placed.
- If you clear the path to
NAS, metadata will be stored in the local database again
Info title Note Enter the user name and password (6). The user must have permissions to access the NAS.
- In the Period field, enter the metadata storage period in the metadata storage in days. The maximum allowable value is 1000 days.
- Click the Apply button.
- the network storage used to store the metadata, the metadata is recorded to the local database.
- In the User name for network path field, enter the name of the user that has the access to the specified network storage.
- In the Password for network path field, enter the password of the user that has the access to the specified network storage.
Clcik the Apply button.
Configuring the database storage is Configuration of the system log is now complete.
