Applies To:
Show VersionsEnterprise Manager
- 3.1.1
Overview: Logging for devices and Enterprise Manager
Enterprise Managercreates separate audit and system event logs specific to:
- Enterprise Manager activities associated with device management events
- System events for Enterprise Manager itself, not related to device management
Enabling audit logging for device management events
- In the navigation pane, click .
- In the Audit Logging area at the bottom of the screen, for the MCP setting, select Enable.
- Click the Update button.
Viewing and searching audit logs for device configuration changes
Viewing and searching Enterprise Manager system event logs
Enterprise Manager logs all system events specific to the operating system and other Linux components, not associated with Enterprise Manager software. This information is stored in the /var/log/messages file.
You can view the details derived from this data from the System Enterprise Management Logs screen.
Processes used for logging system events
The Enterprise Manager system uses the following processes for logging system events.
System process | This enables |
---|---|
emadmind | The scheduled Enterprise Manager ConfigSnyc feature |
emalertd | Custom alerting features for managed devices, including creating alert instances, assigning alert actions, and logging alert events |
emdeviced | Device management features such as managing device lists, performing high availability functions, and refreshing device status information |
emfiled | Features required to manage device configuration archives, including scheduling a rotating archive schedule, and maintaining pinned archives |
emrptschedd | Scheduled reports creation activities |
swimd | Software image management features, including importing software or hotfix images to the software repository, and deploying software or hotfixes to managed devices |
Overview: Collecting and aggregating log files with LogIQ
With LogIQ, you can view aggregated log events for all of your managed BIG-IP devices from a centralized location and, with its powerful search tool, easily locate specific log events. LogIQ also provides you with the ability to increase storage as needed, by utilizing storage resources from your hypervisor.
You incorporate LogIQ into your network configuration by configuring two VLAN interfaces on your hypervisor. The first interface connects Enterprise Manager™ to the Management VLAN, and the second connects BIG-IP LTM to the Traffic VLAN.
LogIQ components
The LogIQ feature is comprised of these components.
Component | Description |
---|---|
LogIQ Collector | The file that you download (LogIQ-Collector<version>.ova) and install on an ESXi hypervisor (on which storage has been allocated for the LogIQ Collector), and add to the index cluster for log event storage. |
Index cluster | A collection of LogIQ Collectors on which you store log events. |
Source devices | Managed BIG-IP devices from which you collect log events. |
About configuring LogIQ
To start collecting and aggregating log event files through LogIQ, you perform the following tasks.
- Configure two VLAN interfaces as follows:
- A VLAN that connects to Enterprise Manager through the Management network interface
- A VLAN that connects to the BIG-IP LTM through the Traffic network interface
Important: LogIQ is compatible only with BIG-IP LTM devices running version 11.3.0 and later.For specific instructions about how to configure the hypervisor that is located in a network with a DHCP server, refer to your VMware ESXi hypervisor documentation.
- Download the LogIQ Collector .ova file and deploy it on your VMware ESXi hypervisor version 5.0.0, allocating sufficient storage space for your log indexing volume and retention requirements.
- Specify the default settings for the index cluster. (These settings apply to any LogIQ Collectors added to the index cluster.)
- Add the LogIQ Collector to the index cluster.
- Specify the source devices (managed BIG-IP systems), from which to collect the data.
- Configure a network logging profile on the source device
Configuring IP addresses for VLAN interfaces from the command line
Before you can download and install LogIQ Collector, you must configure a management VLAN interface and a traffic VLAN interface. The LogIQ Collector is based on standard Linux CentOS distribution. Therefore, if you do not have a DHCP configured in your network to dynamically assign the IP addresses for the required interfaces, you can configure the IPV4 or IPV6 addresses from the command line.
Downloading the LogIQ Collector
You download the LogIQ Collector .ova file so that you can install it on an ESXi hypervisor for indexing and querying collected log events using the LogIQ feature.
- From a web browser, navigate to the F5 Downloads page at https://downloads.f5.com.
- Locate and download the EM LogIQ Collector package ending with .ova.
- On your VMware client, deploy the .ova file.
- Allocate a sufficient amount of storage for the LogIQ Collector from the hypervisor, as required by your log indexing volume and retention needs.
Specifying default settings for LogIQ Collector index clusters
Adding a LogIQ Collector to the index cluster
When you add the first LogIQ Collector to the index cluster, it is available to index log events.
- On the Main tab, click Enterprise Management .
- Click the Add Device button.
- In the LogIQ Collector IP Address field, type the IP address of the LogIQ Collector that you downloaded.
- If you want the source device to use an IPV6 address (if available) for the traffic VLAN, select the Use IPV6 address check box.
- Click the Add button.
- The LogCollector you added displays in the index cluster table.
- Click the address of the LogIQ Collector that you added.
- In the Storage Devices list, select the check box next to an available device from which you can allocate storage for LogIQ.
- Click the Allocate storage button.
- In the dialog box that displays, click the Add button.
Specifying a source device for LogIQ
- On the Main tab, click .
- Click the Add devices button.
- Use the Device List and Device Filter settings to specify which devices you want displayed.
- Select the check box next to the source device for which you want to collect log events.
- Click the Add devices button.
Configuring a network firewall logging profile on a source device
You can create a network firewall logging profile only after you add a LogIQ Collector to the index cluster and specify a source device.
- On the Main tab, click .
- Click the Create button.
- In the Profile Name field, type a unique name to identify this logging profile.
- For the Network Firewall logging profile setting, select the Enabled check box.
- From the Publisher list, select em-centlog-pub.
- Select the check box next to each type of log event that you want to log.
-
From the Storage Format list, select the format type
that you want to use for the log events.
- If you want to use a delimiter to separate the fields, in the Delimiter field, type a value.
- From the Available items list, select the items that you want stored.
- If you want to collect IP Intelligence log events, from the Publisher list, select em-centlog-pub.
- Click the Finished button.
All specified log events are now collected and displayed on Enterprise Manager.
About viewing and searching all collected log events
LogIQ features a powerful search tool that helps you easily locate specific log events. You can view all collected log events at once, or selected log events that occurred in a standard time period. You can also create your own customized time frame for which to view log events. These search options give you the flexibility to quickly find the information that you need.
Viewing all collected log events for a standard time period
- On the Main tab, click .
- From the Time Period list, select a standard period of time for which you want to view log events.
- Click the Update button.
Viewing all collected log events for a custom time period
- From the Time Period list, select Custom.
-
Click in the From field.
- On the calendar, click the first day from which you want to view collected log events. Alternatively, click the Now button to populate the From field with the current date and time.
- For the Hour, Minute, and Second settings, move the slide bar to the right to specify the time of day to start displaying collected log events.
-
Click in the To field.
- On the calendar, click the last day for which you want to view collected log events. Alternatively, click the Now button to populate the To field with the current date and time.
- For the Hour, Minute, and Second settings, move the slide bar to the right to specify the time of day to stop displaying collected log events.
- Click the Update button.
Creating a search filter for all collected log events
About viewing and searching only network events
When you have LogIQ configured, you can view all collected logs or only those specific to the network. You also have the option to view all collected network log events at once, or selected network log events that occurred in a standard time period. Another option is to create your own customized time frame for which to view network log events. These search options give you the flexibility to quickly find the information that you need.
Viewing collected network log events for a standard time period
- On the Main tab, click .
- From the Time Period list, select a standard period of time for which you want to view network log events.
- Click the Update button.
Viewing collected network log events for a custom time period
- On the Main tab, click .
- From the Time Period list, select Custom.
-
Click in the From field.
- On the calendar, click the first day from which you want to view collected log events. Alternatively, click the Now button to populate the From field with the current date and time.
- For the Hour, Minute, and Second settings, move the slide bar to the right to specify the time of day to start displaying collected log events.
-
Click in the To field.
- On the calendar, click the last day for which you want to view collected log events. Alternatively, click the Now button to populate the To field with the current date and time.
- For the Hour, Minute, and Second settings, move the slide bar to the right to specify the time of day to stop displaying collected log events.
- Click the Update button.
Creating a search filter for collected network log events
- On the Main tab, click .
- Locate the log event, or log event element that you want to add to the custom search filter.
- To add all of the elements of a single log event, hover over the first column of an log event table and drag it to the Custom Search field. Alternatively, you can hover over a single element in a log event and drag it to the Custom Search field.
- When you have selected the last log event or element, click the Update button.