Veritas Access Appliance 8.3 Administrator's Guide
- Section I. Introducing Access Appliance
- Section II. Configuring Access Appliance
- Managing users
- Managing licenses
- Configuring the network
- Configuring authentication services
- Configuring user authentication using digital certificates or smart cards
- Section III. Managing Access Appliance storage
- Configuring storage
- Managing disks
- Access Appliance as an iSCSI target
- Configuring storage
- Section IV. Managing Access Appliance file access services
- Configuring the NFS server
- Setting up Kerberos authentication for NFS clients
- Using Access Appliance as a CIFS server
- About configuring CIFS for Active Directory (AD) domain mode
- About setting trusted domains
- About managing home directories
- About CIFS clustering modes
- About migrating CIFS shares and home directories
- Using Access Appliance as an Object Store server
- Configuring the S3 server using GUI
- Configuring the NFS server
- Section V. Managing Access Appliance security
- Managing security
- Setting up FIPS mode
- Configuring STIG
- Setting the banner
- Setting the password policy
- Immutability in Access Appliance
- Deploying certificates on Access Appliance
- Single Sign-On (SSO)
- Configuring multifactor authentication
- Section VI. Monitoring and troubleshooting
- Monitoring the appliance
- Configuring event notifications and audit logs
- About alert management
- Appliance log files
- Section VII. Provisioning and managing Access Appliance file systems
- Creating and maintaining file systems
- Considerations for creating a file system
- About managing application I/O workloads using maximum IOPS settings
- Modifying a file system
- Managing a file system
- Creating and maintaining file systems
- Section VIII. Provisioning and managing Access Appliance shares
- Creating shares for applications
- Creating and maintaining NFS shares
- About the NFS shares
- Creating and maintaining CIFS shares
- About the CIFS shares
- About managing CIFS shares for Enterprise Vault
- Integrating Access Appliance with Data Insight
- Section IX. Managing Access Appliance storage services
- Configuring continuous replication
- How Access Appliance continuous replication works
- Configuring a continuous replication job using the GUI
- Continuous replication failover and failback
- Using snapshots
- Using instant rollbacks
- Configuring continuous replication
- Section X. Reference
Collecting logs using the UI
You can collect logs for an individual node in the cluster or for all the cluster nodes from the Access Appliance UI for error analysis and troubleshooting. You can choose to collect logs for all the components to get a comprehensive view of the system, or you can collect logs for specific components that have an issue.
- Sign in to the Access Appliance UI using the following URL:
http://console-ip:14161
where console-ip is the management console IP address where the web interface is hosted.
- In the left navigation pane click Settings > Diagnostics.
- Click Generate log package.
On the Generate log package page, on the Basic tab select the components to include in the log package.
- To select the components for which you want to collect logs:
On the Basic tab under Log settings, select the components. To select all the components, click All.
Component
Description
Service status
Status of the services running on the cluster nodes.
Performance logs
Logs for collecting performance data.
Common logs
Common logs from multiple modules.
Nas
Product information from cluster nodes.
OS
Kernel and user-level debug logs.
Sos report
SOS reports collected from all nodes using the RHEL sos utility.
Explorer
Logs and environment data collected by the VxExplorer utility from all the nodes.
Install
Installation logs from the
/opt/VRTS/install/logs/
log directory. If you encounter issues during the initial configuration, collect logs from this module.NAS procstats
NAS process stacks from all the nodes. It includes the stack trace for all daemons running on the system.
Appliance
Hardware-specific logs.
SDS
Logs for the software-defined storage plug-in.
Upgrade
Logs generated during an upgrade from all the nodes
Backup
NetBackup client logs and other diagnostic information.
VDD
Veritas Data Deduplication (VDD) logs if VDD is configured on the cluster nodes.
Under Historical logs, you can collect archived logs or logs for a specific duration. To include historical logs, click Archived logs. To include logs for a specific duration, click Select date range and select the duration or select Custom range to customize the duration by specifying the start and the end date. Including logs for a specific time period reduces the size of the generated log package and the time required to collect the logs.
Under Package options, specify a name for the log package and optionally the case number if provided by Veritas Support.
Under Nodes, select the nodes for which you want to collect the logs.
- Click Generate.
The log package is generated in the
/log/support_logs
location. To view the progress of the operation, click View details on the Diagnostics page.If you had specified the case number, it is prefixed to the package name. The generated log package is displayed under Packaged logs. You can now download the package or upload it to Veritas Support for error analysis.