Question & Answer
Question
Occasionally, IBM Security Guardium Key Lifecycle Support will provide and ask you to run the Log Collector tool to assist in gathering data helpful to diagnosing your issue. In this video, you learn how to run the Log Collector and locate the output it creates.
Duration: 5 Minutes
Follow the link in related information to view the course on the IBM Security Learning Academy
[{"Business Unit":{"code":"BU048","label":"IBM Software"},"Product":{"code":"SSWPVP","label":"IBM Security Key Lifecycle Manager"},"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"All Version","Edition":" ","Line of Business":{"code":"LOB76","label":"Data Platform"}}]
Log InLog in to view more of this document
This document has the abstract of a technical article that is available to authorized users once you have logged on. Please use Log in button above to access the full document. After log in, if you do not have the right authorization for this document, there will be instructions on what to do next.
Was this topic helpful?
Document Information
Modified date:
11 December 2020
UID
ibm16381488