James Thew - Fotolia
Logs are a principal source of troubleshooting information -- especially in complex environments with important hardware and software interdependencies. VMware's vSphere Replication is the company's hypervisor-based data protection product. A virtual appliance provides detailed logs that can help diagnose potential issues in-house or when communicating with support staff from VMware.
As an example, the hms-configtool.log file located in the /opt/vmware/hms/logs/ folder can reveal problems with vSphere Replication connecting to SQL Server. The same log might also show errors reporting problems supporting DB2 or other database applications. The boot.msg log can report start up problems, which might indicate system faults, connectivity problems or a host of other possible issues. Such logs can significantly shorten the time needed to isolate and resolve problems.
Logs can be accessed through the Replication appliance's management interface using a Web browser. After entering the URL for the appliance's interface, click the vSphere Replication Management (VRM) tab, select Support, and then click Generate. This creates a .zip file of all the current vSphere Replication logs and provides a downloadable link. The .zip file should contain multiple logs from locations including:
It should be possible to access vSphere Replication log files individually, though administrators might need to set permissions to access the log folders or gather logs automatically.
Logs can become extremely large, so a bit of log storage management may become necessary. VMware's vSphere Replication creates new logs when the log file reaches about 50 MB. Replication will retain about 10 older log packages and will remove the oldest log packages to make space for newer ones. This should minimize the need for manual intervention, but you can also opt to delete older log packages as desired by clicking Delete next to the log package you want to remove.
Dig Deeper on VMware ESXi, vSphere and vCenter
Related Q&A from Stephen J. Bigelow
Fog computing vs. edge computing -- while many IT professionals use the terms synonymously, others make subtle but important distinctions between ... Continue Reading
Learn how load balancing in the cloud differs from a traditional network traffic distribution, and explore services available from AWS, Google and ... Continue Reading
Access management is critical to securing the cloud. Understand the differences between AWS IAM roles and users to properly restrict access to AWS ... Continue Reading