Logs are a principal source of troubleshooting information -- especially in complex environments with important...
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
hardware and software interdependencies. VMware's vSphere Replication is the company's hypervisor-based data protection product. A virtual appliance provides detailed logs that can help diagnose potential issues in-house or when communicating with support staff from VMware.
As an example, the hms-configtool.log file located in the /opt/vmware/hms/logs/ folder can reveal problems with vSphere Replication connecting to SQL Server. The same log might also show errors reporting problems supporting DB2 or other database applications. The boot.msg log can report start up problems, which might indicate system faults, connectivity problems or a host of other possible issues. Such logs can significantly shorten the time needed to isolate and resolve problems.
Logs can be accessed through the Replication appliance's management interface using a Web browser. After entering the URL for the appliance's interface, click the vSphere Replication Management (VRM) tab, select Support, and then click Generate. This creates a .zip file of all the current vSphere Replication logs and provides a downloadable link. The .zip file should contain multiple logs from locations including:
It should be possible to access vSphere Replication log files individually, though administrators might need to set permissions to access the log folders or gather logs automatically.
Logs can become extremely large, so a bit of log storage management may become necessary. VMware's vSphere Replication creates new logs when the log file reaches about 50 MB. Replication will retain about 10 older log packages and will remove the oldest log packages to make space for newer ones. This should minimize the need for manual intervention, but you can also opt to delete older log packages as desired by clicking Delete next to the log package you want to remove.
Dig Deeper on Backing up VMware host servers and guest OSes
Related Q&A from Stephen J. Bigelow
One size does not fit all when administrators develop a protection policy for specific applications. Learn about the configuration options in System ...continue reading
Set up and operate a VM network using proven strategies to ensure security and performance. With a little planning, virtualization admins can avoid ...continue reading
Virtual switch security is achieved through a number of features. Virtualization admins can create and enforce policies, lock down MAC addresses and ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.