<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: ISE Logging in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/ise-logging/m-p/4169785#M563412</link>
    <description>&lt;P&gt;i can just add Damien :0)&lt;/P&gt;&lt;P&gt;backup&amp;amp;restore approach will be your friend&lt;/P&gt;</description>
    <pubDate>Mon, 19 Oct 2020 19:12:15 GMT</pubDate>
    <dc:creator>Andrii Oliinyk</dc:creator>
    <dc:date>2020-10-19T19:12:15Z</dc:date>
    <item>
      <title>ISE Logging</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-logging/m-p/4169714#M563406</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are working to upgrade our ISE from version 2.0.1&lt;/P&gt;&lt;P&gt;In order to reduce the upgrade time to a reasonable level we have purged data to 40 days worth.&lt;/P&gt;&lt;P&gt;We still have a very long upgrade time.&lt;/P&gt;&lt;P&gt;Currently each of our MNT nodes alone will take 4 hours to upgrade.&lt;/P&gt;&lt;P&gt;Are there other options to reduce this figure?&lt;/P&gt;&lt;P&gt;I presume that an OPS backup would act as a full backup of all logs, is this correct?&lt;/P&gt;&lt;P&gt;Could we therefore, as an option, purge more data and restore it post-upgrade?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Oct 2020 17:14:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-logging/m-p/4169714#M563406</guid>
      <dc:creator>axa_tech_uk</dc:creator>
      <dc:date>2020-10-19T17:14:45Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Logging</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-logging/m-p/4169728#M563407</link>
      <description>&lt;P&gt;Create a new ISE deployment on the version you are moving to, migrate all settings and get that deployment working exactly as you need it, then migrate your NADs (e.g WLCs, Router/Switches using TACACS) to use the new AND the old deployment. There is an entire deployment guide for upgrading ISE in this way&lt;/P&gt;</description>
      <pubDate>Mon, 19 Oct 2020 17:37:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-logging/m-p/4169728#M563407</guid>
      <dc:creator>Eric Marshott</dc:creator>
      <dc:date>2020-10-19T17:37:21Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Logging</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-logging/m-p/4169778#M563410</link>
      <description>&lt;P&gt;As you pointed out, you can restore operational data from a backup, but most don't bother. Is there a firm requirement to maintain the historical logging through the upgrade? I often purge as aggressively as I can to maintain the minimum, 1 day, or skip upgrading the MNT and install it new from the ISO.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;If you do choose to backup/restore the operational data, keep in mind that you restore it to each MNT node individually.&lt;BR /&gt;&lt;BR /&gt;I assume you are going 2.0.1 to 2.4 if this question is coming up. Have you considered standing up a "new" deployment in parallel on 2.7, potentially powering off the 2.0 node(s) and reusing IPs?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Oct 2020 18:58:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-logging/m-p/4169778#M563410</guid>
      <dc:creator>Damien Miller</dc:creator>
      <dc:date>2020-10-19T18:58:54Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Logging</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-logging/m-p/4169785#M563412</link>
      <description>&lt;P&gt;i can just add Damien :0)&lt;/P&gt;&lt;P&gt;backup&amp;amp;restore approach will be your friend&lt;/P&gt;</description>
      <pubDate>Mon, 19 Oct 2020 19:12:15 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-logging/m-p/4169785#M563412</guid>
      <dc:creator>Andrii Oliinyk</dc:creator>
      <dc:date>2020-10-19T19:12:15Z</dc:date>
    </item>
    <item>
      <title>Re: ISE Logging</title>
      <link>https://community.cisco.com/t5/network-access-control/ise-logging/m-p/4172119#M563475</link>
      <description>&lt;P&gt;Watching the upgrade for 8 or 12 or 20 hours: why do you regard it as ‘long’ after &amp;nbsp;5+ years of undisturbed ISE operation?&lt;/P&gt;</description>
      <pubDate>Thu, 22 Oct 2020 21:15:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/ise-logging/m-p/4172119#M563475</guid>
      <dc:creator>Peter Koltl</dc:creator>
      <dc:date>2020-10-22T21:15:31Z</dc:date>
    </item>
  </channel>
</rss>

