OS Linux[centos,RHEL]/Trouble shooting

sosreport (log 수집 후 파일 생성)

infra 2021. 12. 9. 00:23

sosreport는 해당 로그를 수집하여 Redhat 관련 (IBM) 업체에게 보내서 해당 케이스에 대한 분석을 요청할 수 있는 방법이다.

출처

https://blog.cafe24.com/1669

 

[리눅스] sosreport를 사용하여 시스템 점검하기

카페24 서버호스팅 Guide sosreport를 사용하여 시스템 점검하기 sosreport는 시스템 설정정보를 수집해 주는 명령어이다. 방화벽으로 접근이 불가능한 시스템이나, root 권한을 주지 않고 시스템에 대

blog.cafe24.com

 

1. sosreport 패키지 확인 및 경로 파악

 

[root@inradocker ~]# rpm -qa |grep sos-
sos-3.8-6.el7.centos.noarch

 

[root@inradocker ~]# which sosreport
/usr/sbin/sosreport
[root@inradocker ~]# rpm -qf /usr/sbin/sosreport
sos-3.8-6.el7.centos.noarch

 

2.패키지 설치되어 있지 않다면 ? sos 패키지 설치

yum install sos

 

 

cf)참고

aix에선 #snap -ac # snap 명령어를 통해서 로그수집을 할 수 있다. errpt를 따로 로그 수집하는 경우엔

errpt >> /tmp/log.txt 파일로 떨구어도 된다.

 

 

 

3.sosreport를 통한 로그 수집

#sosreport  단순 명령어를 통해 해당 관련 로그들이 수집된다.

 

더보기

[root@inradocker /]# sosreport

sosreport (version 3.8)

This command will collect diagnostic and configuration information from
this CentOS Linux system and installed applications.

An archive containing the collected information will be generated in
/var/tmp/sos.Vrr2BN and may be provided to a CentOS support
representative.

Any information provided to CentOS will be treated in accordance with
the published support policies at:

  https://wiki.centos.org/

The generated archive may contain data considered sensitive and its
content should be reviewed by the originating organization before being
passed to any third party.

No changes will be made to system configuration.

Press ENTER to continue, or CTRL-C to quit.

Please enter the case id that you are generating this report for []:

 Setting up archive ...
 Setting up plugins ...
[plugin:networking] skipped command 'ip -s macsec show': required kernel modules or services not present (kmods=[macsec] services=[]). Use '--allow-system-changes' to enable collection.
[plugin:networking] skipped command 'ss -peaonmi': required kernel modules or services not present (kmods=[tcp_diag,udp_diag,inet_diag,unix_diag,netlink_diag,af_packet_diag] services=[]). Use '--allow-system-changes' to enable collection.

 Running plugins. Please wait ...

Starting 1/103 abrt            [Running: abrt]             Starting 2/103 alternatives    [Running: abrt alternatives]                     
Starting 3/103 anaconda        [Running: abrt alternatives anaconda]            Starting 4/103 anacron         [Running: abrt alternatives anaconda anacron]    
Starting 5/103 ata             [Running: abrt alternatives ata]                  Starting 6/103 auditd          [Running: abrt alternatives ata auditd]          
Starting 7/103 block           [Running: alternatives ata auditd block]          Starting 8/103 boot            [Running: alternatives block boot]               
Starting 9/103 btrfs           [Running: alternatives block boot btrfs]          Starting 10/103 ceph            [Running: block boot btrfs ceph]                
Starting 11/103 cgroups         [Running: block boot ceph cgroups]            Starting 12/103 chrony          [Running: block boot cgroups chrony]            
Starting 13/103 cron            [Running: block boot cgroups cron]              Starting 14/103 crypto          [Running: block boot cgroups crypto]            
Starting 15/103 cups            [Running: block boot cgroups cups]              Starting 16/103 date            [Running: block boot cgroups date]              
Starting 17/103 dbus            [Running: boot cgroups date dbus]               Starting 18/103 devicemapper    [Running: boot cgroups dbus devicemapper]       
Starting 19/103 devices         [Running: boot cgroups dbus devices]            Starting 20/103 dmraid          [Running: boot cgroups dbus dmraid]             
Starting 21/103 docker          [Running: boot cgroups dbus docker]             Starting 22/103 dracut          [Running: boot cgroups docker dracut]           
Starting 23/103 fcoe            [Running: cgroups docker dracut fcoe]           Starting 24/103 filesys         [Running: cgroups docker dracut filesys]       
Starting 25/103 firewalld       [Running: cgroups docker dracut firewalld]      Starting 26/103 gdm             [Running: docker dracut firewalld gdm]          
Starting 27/103 gluster         [Running: docker dracut firewalld gluster]      Starting 28/103 grub2           [Running: dracut firewalld gluster grub2]       
Starting 29/103 gssproxy        [Running: dracut firewalld grub2 gssproxy]      Starting 30/103 hardware        [Running: dracut firewalld grub2 hardware]      
Starting 31/103 host            [Running: dracut firewalld grub2 host]          Starting 32/103 hts             [Running: dracut firewalld grub2 hts]           
Starting 33/103 i18n            [Running: dracut firewalld grub2 i18n]          Starting 34/103 iscsi           [Running: dracut firewalld grub2 iscsi]         
Starting 35/103 jars            [Running: dracut firewalld grub2 jars]          Starting 36/103 java            [Running: dracut firewalld grub2 java]          
Starting 37/103 kdump           [Running: dracut firewalld grub2 kdump]         Starting 38/103 kernel          [Running: dracut firewalld kdump kernel]        
Starting 39/103 keyutils        [Running: dracut firewalld kernel keyutils]     Starting 40/103 kpatch          [Running: dracut firewalld kernel kpatch]       
Starting 41/103 krb5            [Running: dracut firewalld kernel krb5]         Starting 42/103 last            [Running: dracut firewalld kernel last]         
Starting 43/103 ldap            [Running: dracut firewalld kernel ldap]         Starting 44/103 libraries       [Running: dracut firewalld kernel libraries]    
Starting 45/103 libvirt         [Running: dracut firewalld kernel libvirt]      Starting 46/103 logrotate       [Running: dracut firewalld kernel logrotate]    
Starting 47/103 logs            [Running: firewalld kernel logs]                Starting 48/103 lvm2            [Running: firewalld kernel logs lvm2]           
Starting 49/103 md              [Running: firewalld lvm2 md]                    Starting 50/103 memory          [Running: firewalld lvm2 md memory]             
Starting 51/103 mrggrid         [Running: firewalld lvm2 memory mrggrid]        Starting 52/103 mrgmessg        [Running: firewalld lvm2 memory mrgmessg]       
Starting 53/103 multipath       [Running: firewalld lvm2 memory multipath]      Starting 54/103 networking      [Running: firewalld lvm2 multipath networking]  
Starting 55/103 networkmanager  [Running: firewalld lvm2 networking networkman  Starting 56/103 nfs             [Running: firewalld networking networkmanager   
Starting 57/103 nis             [Running: firewalld networking networkmanager   Starting 58/103 nss             [Running: firewalld networking networkmanager   
Starting 59/103 ntb             [Running: firewalld networking networkmanager   Starting 60/103 numa            [Running: firewalld networking networkmanager   
Starting 61/103 oddjob          [Running: firewalld networking networkmanager   Starting 62/103 opengl          [Running: firewalld networking networkmanager   
Starting 63/103 openhpi         [Running: firewalld networking networkmanager   Starting 64/103 openshift       [Running: firewalld networking networkmanager   
Starting 65/103 openssl         [Running: firewalld networking networkmanager   Starting 66/103 openswan        [Running: firewalld networking networkmanager   
Starting 67/103 pam             [Running: networking networkmanager openswan p  Starting 68/103 pci             [Running: networking networkmanager pci]        
Starting 69/103 perl            [Running: networking networkmanager pci perl]   Starting 70/103 postfix         [Running: networking networkmanager pci postfi  
Starting 71/103 ppp             [Running: networking networkmanager postfix pp  Starting 72/103 process         [Running: networking networkmanager process]    
Starting 73/103 processor       [Running: networking networkmanager process pr  Starting 74/103 psacct          [Running: networking process processor psacct]  
Starting 75/103 python          [Running: networking process processor python]  Starting 76/103 rasdaemon       [Running: networking process processor rasdaem  
Starting 77/103 release         [Running: networking process processor release  Starting 78/103 rpm             [Running: networking process processor rpm]     
Starting 79/103 samba           [Running: networking processor rpm samba]       Starting 80/103 sar             [Running: networking processor rpm sar]         
Starting 81/103 scsi            [Running: networking processor rpm scsi]        Starting 82/103 selinux         [Running: networking processor rpm selinux]     
Starting 83/103 services        [Running: networking processor selinux service    Starting 84/103 soundcard       [Running: processor selinux services soundcard  
Starting 85/103 ssh             [Running: processor selinux soundcard ssh]       Starting 86/103 sudo            [Running: processor selinux soundcard sudo]     
Starting 87/103 sunrpc          [Running: processor selinux soundcard sunrpc]   Starting 88/103 system          [Running: processor selinux system]             
Starting 89/103 systemd         [Running: processor selinux system systemd]     Starting 90/103 systemtap       [Running: selinux system systemd systemtap]     
Starting 91/103 sysvipc         [Running: selinux systemd systemtap sysvipc]    Starting 92/103 teamd           [Running: selinux systemd systemtap teamd]      
Starting 93/103 tuned           [Running: selinux systemd systemtap tuned]      Starting 94/103 udev            [Running: selinux systemd systemtap udev]       
Starting 95/103 unpackaged      [Running: selinux systemd systemtap unpackaged  Starting 96/103 usb             [Running: selinux systemd systemtap usb]        
Starting 97/103 vdo             [Running: selinux systemd systemtap vdo]        Starting 98/103 vhostmd         [Running: selinux systemd systemtap vhostmd]    
Starting 99/103 wireless        [Running: selinux systemd systemtap wireless]   Starting 100/103 x11             [Running: selinux systemd systemtap x11]       
Starting 101/103 xen             [Running: selinux systemd systemtap xen]       Starting 102/103 xfs             [Running: selinux systemd systemtap xfs]       
Finishing plugins              [Running: selinux systemd systemtap]             Starting 103/103 yum             [Running: selinux systemd systemtap yum]       
Finishing plugins              [Running: selinux systemtap yum]                 Finishing plugins              [Running: selinux yum]                           
Finishing plugins              [Running: yum]                                 
  Finished running plugins                                                      
Creating compressed archive...

Your sosreport has been generated and saved in:
  /var/tmp/sosreport-inradocker-2021-12-08-toqwajp.tar.xz     //경로에 저장된 파일

The checksum is: df5f4764c525ff598f78f005ad01a351

Please send this file to your support representative.

 

 /var/tmp/sosreport-inradocker-2021-12-08-toqwajp.tar.xz     //경로에 저장된 파일

해당파일을 tar 압축하여 풀고 바로 확인할 수도 있으며,

로그 분석 요청할 회사에 scp 명령어로 파일 서버 쪽으로 던진 후 벤더사에 보내면 된다.