. . . "To retrieve the error, trace, audit and other such information generated by any application or process within the network, an administrator simply requests the desired information from the centralized logging facility." . .