NVP vProxy: How to Enable Remote System Logging (rsyslog)

Summary: This KB details how to configure rsyslog capabilities with the NetWorker VMware Protection (NVP) vProxy appliance.

This article applies to This article does not apply to This article is not tied to any specific product. Not all product versions are identified in this article.

Instructions

The NetWorker 19.8 vProxy deployment offers remote system logging (rsyslog) capabilities:

  • vProxy does not stop logging to the local server even if it loss connection with Remote Server.
  • vProxy provides option to send log using Transmission Control Protocol (TCP) or User Datagram Protocol (UDP).
  • vProxy provides remote logging functionality with minimal overhead.
  • vProxy redirects every log message to the remote server.
  • Necessary code changes are implemented in the vProxy source code.
  • vProxy can send logs to the local server or a remote server.

Limitations:

  • The vProxy appliance can only send logs to one remote server.

Requirements:

  • vProxy 4.3.0-38 or later is installed.
  • Linux server with rsyslog package is installed.
NOTE: rsyslog is a third-party utility not provided with NetWorker software. See operating system vendor instructions for installing the rsyslog package.

 

Process:

Configure the monitoring server:

  1. Log in to the syslog monitoring server and confirm that rsyslog is installed: 
# rsyslogd -v
Example:
root@linux1:~# rsyslogd -v
rsyslogd 8.24.0-57.el7_9.3, compiled with:
        PLATFORM:                               x86_64-redhat-linux-gnu
        PLATFORM (lsb_release -d):
        FEATURE_REGEXP:                         Yes
        GSSAPI Kerberos 5 support:              Yes
        FEATURE_DEBUG (debug build, slow code): No
        32bit Atomic operations supported:      Yes
        64bit Atomic operations supported:      Yes
        memory allocator:                       system default
        Runtime Instrumentation (slow code):    No
        uuid support:                           Yes
        Number of Bits in RainerScript integers: 64
See the rsyslog site for more information:
http://www.rsyslog.com This hyperlink is taking you to a website outside of Dell Technologies.
  1. Modify the rsyslog configuration file to allow TCP or UDP and set the location of the log output:
# vi /etc/rsyslog.conf
For TCP, uncomment the following lines:
# Provides TCP syslog reception
#$ModLoad imtcp
#$InputTCPServerRun 514
For UDP, uncomment the following lines:
# Provides UDP syslog reception
#$ModLoad imudp
#$UDPServerRun 514
NOTE: The settings shown use the default port (514). If you chose to change the port, the change must also be reflected in the vProxy configuration.

Set the log output location (this path is user-defined and can be changed as per your discretion):
$template FILENAME,"/var/log/syslog/%HOSTNAME%/syslog.log"
*.* ?FILENAME

Example of completed changes for UDP monitoring:

# Provides UDP syslog reception
$ModLoad imudp
$UDPServerRun 514

# Provides TCP syslog reception
#$ModLoad imtcp
#$InputTCPServerRun 514

$template FILENAME,"/var/log/syslog/%HOSTNAME%/syslog.log"
*.* ?FILENAME

Save the file.

  1. Restart syslogd:
# systemctl restart rsyslog.service
NOTE: If firewalls are present, configure a rule to allow this port to communicate through the firewall using TCP or UDP as per the above configurations. See operating system vendor instructions for configuring operating system firewall rules.
  1. Confirm that the port is listed with netstat:
# netstat -apn | grep rsyslog
root@linux1:~# netstat -apn | grep rsyslog
udp        0      0 0.0.0.0:514             0.0.0.0:*                           5795/rsyslogd
udp6       0      0 :::514                  :::*                                5795/rsyslogd


Configure the vProxy:
The configuration on the vProxy appliance uses the following syntax:

[IP_or_FQDN_of_syslog_server]:[syslog_port]/{tcp|udp}
Example:
linux1.amer.lan:514/udp
NOTE: If TCP or UDP protocols are not specified, UDP is used as the default protocol.
  1. This setting can be applied using either of the following methods:
  • During deploying the OVF template:
Deploying the OVF Template
Figure 1: Deploying the OVF Template
  • In the vProxy's /opt/emc/vproxy/conf/rsyslog.conf file. This can be done at any time after deployment.
NOTE: If this file does not exist, it can be created with a text editor.
  1. Log in to the vProxy appliance as admin, and then switch to root:
$ sudo su -
  1. Confirm the settings in the /opt/emc/vproxy/conf/rsyslog.conf file:
vproxy01:~ # cat /opt/emc/vproxy/conf/rsyslog.conf
linux1.amer.lan:514/udp
  1. If no Virtual Machine (VM) backup operations are running on the vProxy, you can force some messages to the syslog server by restarting the vbackupd service:
# systemctl restart vbackup
 

Conclusion:

Once the above settings are applied, syslog files should be generated on the syslog server for the vProxy appliance. This depends on the path set in your syslog configuration.

Example:
root@linux1:~# tail -n 10  /var/log/syslog/vproxy01.amer.lan/syslog.log
2023-03-01T09:47:00-08:00 vproxy01.amer.lan vProxy[8014]: 2023-03-01T17:47:00Z TRACE:  Configured with 1 resource types.
2023-03-01T09:47:00-08:00 vproxy01.amer.lan vProxy[8014]: 2023-03-01T17:47:00Z NOTICE: Logging to '/opt/emc/vproxy/runtime/logs/vbackupd/vbackupd-snapmgr.log' on host 'vproxy01.amer.lan'.
2023-03-01T09:47:00-08:00 vproxy01.amer.lan vProxy[8014]: 2023-03-01T17:47:00Z NOTICE: Release: '4.3.0-38_1', Build number: '1', Build date: '2022-11-04T08:24:00Z'
2023-03-01T09:47:00-08:00 vproxy01.amer.lan vProxy[8014]: 2023-03-01T17:47:00Z NOTICE: Setting log level to INFO.
2023-03-01T09:47:00-08:00 vproxy01.amer.lan vProxy[8014]: 2023-03-01T17:47:00Z NOTICE: Opened Snapshot Manager log file '/opt/emc/vproxy/runtime/logs/vbackupd/vbackupd-snapmgr.log' using level info.
2023-03-01T09:47:00-08:00 vproxy01.amer.lan vProxy[8014]: 2023-03-01T17:47:00Z INFO:   Loaded snapshot map from '/opt/emc/vproxy/runtime/state/vbackupd/SnapshotMaps.gob'.
2023-03-01T09:47:00-08:00 vproxy01.amer.lan vProxy[8014]: 2023-03-01T17:47:00Z NOTICE: vCenter 'vcsa.amer.lan' has no Remove Snapshot requests.
2023-03-01T09:47:00-08:00 vproxy01.amer.lan vProxy[8014]: 2023-03-01T17:47:00Z NOTICE: No remove snapshot requests associated with vCenter 'vcsa.amer.lan'.
2023-03-01T09:47:00-08:00 vproxy01.amer.lan vProxy[8014]: 2023-03-01T17:47:00Z INFO:   Saved snapshot map to '/opt/emc/vproxy/runtime/state/vbackupd/SnapshotMaps.gob'.
2023-03-01T09:47:00-08:00 vproxy01.amer.lan vProxy[8014]: 2023-03-01T17:47:00Z NOTICE: Started Snapshot Manager.

Additional Information

Log Rotation:
Optionally, log rotation can be configured on the remote logging server. For example, if the rsyslog configuration looks similar to:

$template FILENAME,"/var/log/syslog/%HOSTNAME%/syslog.log"
*.* ?FILENAME

The /etc/logrotate.conf could contain:

/var/log/syslog/*/syslog.log {
    rotate 5
    weekly
    delaycompress
    compress
}
  • weekly - This is the log rotation period; the logs are rotated every week. Other possible values are daily and monthly.
  • Rotate 5 - This indicates that only five rotated logs should be kept. The oldest file is removed on the subsequent run.
  • compress and delaycompress - These are used to tell that all rotated logs, except for the most recent log, should be compressed.
  • Other options are found in the logrotate man page on the Linux site. 

This results in the log rotating once per week:

root@linux1:~# ls -l /var/log/syslog/vproxy01.amer.lan/
total 32760
-rw------- 1 root root  6698746 Mar  6 07:15 syslog.log
-rw------- 1 root root 24760221 Mar  5 03:17 syslog.log-20230305
NOTE: The backup or system administrator must perform any required system changes.

Affected Products

NetWorker

Products

NetWorker Family, NetWorker Series
Article Properties
Article Number: 000210555
Article Type: How To
Last Modified: 25 Mar 2025
Version:  6
Find answers to your questions from other Dell users
Support Services
Check if your device is covered by Support Services.