NVP: Overview of rsyslog Modules and Forwarded Logs in vProxy

Summary: Overview of vProxy logs and rsyslog configuration for log forwarding

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Instructions

See the following article to configure rsyslog for remote system logging in vProxy: NVP vProxy: How to Enable Remote System Logging (rsyslog)

Default Modules Loaded

The following modules are typically enabled by default in rsyslog:

  • immark - Inserts --MARK-- messages periodically (default: Every hour)
  • imuxsock - Receives log messages from local applications (for example, the logger command).
  • imklog - Captures kernel log messages

Network Logging Modules

Allow remote log reception, either TCP or UDP input modules must be configured:

  • imudp - Listens for incoming logs by UDP on port 514.
  • imtcp - Listens for incoming logs by TCP on port 514.
 
Note: Only one of these modules must be enabled depending on your preferred transport protocol.


Log Files Currently Being Forwarded

vProxy Application Logs

By default, the Proxy application logs are also captured after configuring /opt/emc/vproxy/conf/rsyslog.conf file:

  • vbackupd
  • vflrd
  • vkpod
  • vrapid
  • vrecoverd
  • vsessionsd

These logs help in monitoring and troubleshooting vProxy-specific operations.

Extra Log File Configuration

System Related Logs

In addition to application logs, the below logs can also be forwarded if required:

  • /var/log/messages - General system messages
  • /var/log/warn - Warnings and critical messages
  • /var/log/mail - All mail-related logs
    • /var/log/mail.info
    • /var/log/mail.warn
    • /var/log/mail.err
  • /var/log/localmessages - Custom application logs (for example, local0 - local7)
  • :omusrmsg:* - Emergency messages broadcast to all logged-in users

On vProxy edit /etc/rsyslog.conf - include the following lines.

*.* @remoteserver:514  # Forward logs via UDP
*.* @@remoteserver:514  # Forward logs via TCP

Include this in /etc/rsyslog.d/remote.conf.

*.* @remoteserver:514
*.* @@remoteserver:514 

 

Note: Reboot of vProxy is required for the changes to take into effect.

Additional Information

See the following article to configure rsyslog for remote system logging in NVP vProxy: NVP vProxy: How to Enable Remote System Logging (rsyslog)

Affected Products

NetWorker Family
Article Properties
Article Number: 000323313
Article Type: How To
Last Modified: 15 Jan 2026
Version:  3
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.