How do I install and run the Gemini IP Logger?

The Gemini IP Logger software captures the Gemini TBC messages and saves the information to a timestamped text file on the PC running the Database Supervisor application. The log file may then be analysed by Trilogy engineering to debug any potential issues related to the system.

Step-by-step guide

  1.  The logging software is available on request. To enable logging, first browse to each Gemini host and open the Admin > Debug screen, the log in default password is ‘trilogy’. Once in the Debug > Settings screen, tick the ‘Debug logging’ and ‘Spy logging’ check boxes and click ‘Apply’ for the changes to take. These changes can be made on the live system without disrupting the system.  

2.  The timestamp for the log file is taken from the PC running the logging software so please check the PC time and date are correct before commencing the log.

3.  To install the software just extract the zip file to any directory (for example ‘C:\trilogy\IPLogger’) on the PC running the Gateway Editor / Database Supervisor. Now launch the ‘GeminiLogger.exe’.

4.  Once the IPLogger is running it will automatically detect the Gemini hosts connected to the local Database Supervisor. In the ‘Host’ window of the IPLogger application you should see the connected Gemini hots IP address now appear.

 


5.  To start the logging the Gemini host(s), double click on each of the IP address in the Hosts window, this will launch a new log window for each host and capture of Gemini TBC messages will now commence in each of the open logging windows.


Please note the host logging window must be kept open for the capture to occur, closing this window will stop the logging for that host. Test the logging is functioning by a panel key press on the host and then confirm that TBC messages start to appear in the logging window. The time stamped log files are generated in sub folders to the C:\trilogy\IPLogger\path.



Copyright, Trilogy Communications.
---------------
The information on this page is owned by Clear-Com and constitutes Clear-Com’s confidential and proprietary information, may be used solely for purposes related to the furtherance of Clear-Com’ business and shall not be disclosed, distributed, copied or disseminated without Clear-Com’s prior written consent.