NVP: Overview of rsyslog Modules and Forwarded Logs in vProxy
Summary: Overview of vProxy logs and rsyslog configuration for log forwarding
Instructions
See the following article to configure rsyslog for remote system logging in vProxy: NVP vProxy: How to Enable Remote System Logging (rsyslog)
Default Modules Loaded
The following modules are typically enabled by default in rsyslog:
immark- Inserts--MARK--messages periodically (default: Every hour)imuxsock- Receives log messages from local applications (for example, theloggercommand).imklog- Captures kernel log messages
Network Logging Modules
Allow remote log reception, either TCP or UDP input modules must be configured:
imudp- Listens for incoming logs by UDP on port 514.imtcp- Listens for incoming logs by TCP on port 514.
Log Files Currently Being Forwarded
vProxy Application Logs
By default, the Proxy application logs are also captured after configuring /opt/emc/vproxy/conf/rsyslog.conf file:
vbackupdvflrdvkpodvrapidvrecoverdvsessionsd
These logs help in monitoring and troubleshooting vProxy-specific operations.
Extra Log File Configuration
System Related Logs
In addition to application logs, the below logs can also be forwarded if required:
/var/log/messages- General system messages/var/log/warn- Warnings and critical messages/var/log/mail- All mail-related logs/var/log/mail.info/var/log/mail.warn/var/log/mail.err
/var/log/localmessages- Custom application logs (for example, local0 - local7):omusrmsg:*- Emergency messages broadcast to all logged-in users
On vProxy edit /etc/rsyslog.conf - include the following lines.
*.* @remoteserver:514 # Forward logs via UDP
*.* @@remoteserver:514 # Forward logs via TCP
Include this in /etc/rsyslog.d/remote.conf.
*.* @remoteserver:514
*.* @@remoteserver:514
Additional Information
See the following article to configure rsyslog for remote system logging in NVP vProxy: NVP vProxy: How to Enable Remote System Logging (rsyslog)