Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Insert excerpt
_Banners
_Banners
nameadministration
nopaneltrue

This page is for administrators who need to monitor events on the PhixFlow system using the server log files

Table of Contents

Overview

Thelogs you

You can

use to

monitor PhixFlow activity

are

using:

User activity and tasks within PhixFlow: use
  1. the 
    Insert excerpt
    _console
    _console
    nopaneltrue
     records details of user activity and tasks within PhixFlow.
The PhixFlow webapp activity on the serve: use
  1. For details, see System Console. You can configure system logging options in the System Logging Configuration properties.
  2. server log files, which record PhixFlow activity on the server and network. These files are generated by:
    • the PhixFlow webapp
    • the Tomcat servlet.

This page explains where to find the server log files,

especially phixflow.log.
  • Tomcat servlet and network activity related to PhixFlow; use the Tomcat logs.
  • These are described in more detail below.

    Insert excerpt_system_log_system_lognopaneltrue.
    Panel
    borderColor#7da054
    titleColorwhite
    titleBGColor#7da054
    borderStylesolid
    titleSections on this page

    Table of Contents
    indent12px
    stylenone

    Server Log Files

    and how to configure them. 

    See also Logs for Third-Party Systems.

    Activity Within PhixFlow

    Where to Look

    To find the information about user activity and tasks within PhixFlow, use the  Insert excerpt_console_consolenopaneltrue; see System Console.

    Configuration

    You can configure system logging options in the System Logging Configuration properties. In the top right of the console, right-click 

    If you want to integrate PhixFlow server logs into other logging frameworks, such as Google Cloud's stackdriver, please contact support@phixflow.com.

    PhixFlow Webapp Log Files 
    Anchor
    webapp-logs
    webapp-logs

    Where to Look

    To find the logged information about PhixFlow webapp activity on the server and network, use the log files saved in

    the <path>

    the <tomcat_installation_base>/logs directory. You can also download a zip file of all or selected log files; see Downloading Server Log Files, below.

    The default names of the server log files generated by PhixFlow are:

    • phixflow.
    log (default name)
    • log 
    • phixflow.
    log.
    • <date>
    (default name)
  • security.log
  • ?????
  • manager.<date>.log
  • localhost_access_log.<date>.txt
  • localhost.<date>.log
  • host-manager.<date>.log
  • catalina.out and catalina.<date>.log
  • The main log files are phixflow.log and phixflow.log.<date>.
    • .<increment number>.log.gz
    • security.log
    • security.<date>.log
    • audit.log

    If you have multiple instances of PhixFlow hosted under the same Tomcat instance, each PhixFlow instance

    has

    requires a different log file name. You can find

    out

    the log file names for different instances

    in logback

    in logback.xml.

    Security.log

    records:

    This records all

    logouts including: username, session, IP address,

    logouts and login attempts.

    For logouts this includes:

    • username
    • session
    • IP address
    • whether the user logged out or
    the session
    • their session timed out
    .
    all

    For login attempts

    successful login: username, session,

    , this includes:

    • username
    • IP address of the user
    • successful logins include the session 
    • failed attempts
    : username, IP address, and reason for the failure
    • include the reason for the failure

    Audit.log

    This provides reliable auditing that works even if the database goes down or the application is restarted before the audit can be written to the database.

    An audit.log file is created with records that look similar to:

    Code Block
    linenumberstrue
    2024-08-09 12:37:52,724 INFO [ForkJoinPool-6-worker-3] p.audit [LoggingAuditService.java:36] audit summary (transaction=6e069a642616791ed5d43db795a8aab3 id=a43a17886a945bd00ef25a10a2201b9d dtm=2024-08-09T12:37:52.696+01:00 code='audit.new' args=['User','acampbell'])
    2024-08-09 12:37:52,725 INFO [ForkJoinPool-6-worker-3] p.audit [LoggingAuditService.java:38] audit object (transaction=6e069a642616791ed5d43db795a8aab3 name='acampbell' ref=User-f7b51ccb65b21f4955985394cd725df2)
    2024-08-09 12:37:52,725 INFO [ForkJoinPool-6-worker-3] p.audit [LoggingAuditService.java:41] audit detail (transaction=6e069a642616791ed5d43db795a8aab3 code='audit.set.field' args=['activeDirectoryGroups',''])
    2024-08-09 12:37:52,725 INFO [ForkJoinPool-6-worker-3] p.audit [LoggingAuditService.java:41] audit detail (transaction=6e069a642616791ed5d43db795a8aab3 code='audit.set.field.nodetail' args=['defaultApplication'])
    2024-08-09 12:37:52,725 INFO [ForkJoinPool-6-worker-3] p.audit [LoggingAuditService.java:41] audit detail (transaction=6e069a642616791ed5d43db795a8aab3 code='audit.set.field.nodetail' args=['defaultDashboard'])
    2024-08-09 12:37:52,725 INFO [ForkJoinPool-6-worker-3] p.audit [LoggingAuditService.java:41] audit detail (transaction=6e069a642616791ed5d43db795a8aab3 code='audit.set.field' args=['deleted',false])
    2024-08-09 12:37:52,725 INFO [ForkJoinPool-6-worker-3] p.audit [LoggingAuditService.java:41] audit detail (transaction=6e069a642616791ed5d43db795a8aab3 code='audit.set.field' args=['designMode',false])
    2024-08-09 12:37:52,726 INFO [ForkJoinPool-6-worker-3] p.audit [LoggingAuditService.java:41] audit detail (transaction=6e069a642616791ed5d43db795a8aab3 code='audit.set.field' args=['domainName','local'])
    2024-08-09 12:37:52,726 INFO [ForkJoinPool-6-worker-3] p.audit [LoggingAuditService.java:41] audit detail (transaction=6e069a642616791ed5d43db795a8aab3 code='audit.set.field' args=['email',''])
    2024-08-09 12:37:52,820 INFO [ForkJoinPool-6-worker-3] p.audit [LoggingAuditService.java:32] audit trans-end (transaction=6e069a642616791ed5d43db795a8aab3 status=FAIL)

    The audit trans-end record has 3 possibilities for each transaction:

    • status=SUCCESS: The transaction completed and the associated audit records are valid

    • status=FAIL: The transaction failed and rolled back

      • The associated audit records should be ignored as they were not committed to the database

    • trans-end missing: The application crashed before the trans-end log message was written

      • This is unlikely but possible the transaction was committed so manual verification against the database is required

    Tip

    On application start up, audit log files are reread. Any audit events that were not successfully persisted are replayed into the database.

    Configuration

    phixflow-logging.xml

    phixflow-logging.xml is configured at installation; see Configure phixflow-

    login The file contains a list of directories that contain log files. PhixFlow uses these directories when you download log files from the GUI.

    When you use the PhixFlow Administration menu option Download Log Files,  PhixFlow uses this file to find the the path to the logs directory; see Downloading Server Log Files, below. 

    You only need to change this file as requested by PhixFlow Support.

    logback.xml

    logback.xml is configured at installation; see Configure logback.xml. The installer sets:

    • the default level of event or error logging
    • the name of the log files generated, if you have multiple PhixFlow instances; see 
    Renaming the Log File.

    The logback.xml file is in:

    Code Block
    <tomcat_installation_base>/webapps/<instance_name>/WEB-INF/classes/logback.xml

    For example:

    Code Block
    /usr/local/tomcat/webapps/phixflow/WEB-INF/classes/logback.xml

    Anchor
    setPhixFlowLogRetention
    setPhixFlowLogRetention
    Setting the retention policy

    The logback configuration includes a setting maxHistory to remove PhixFlow logs after a specified number of days. This is set for each type of log file. Note that these settings apply only to the log files generated by PhixFlow, through logback, and do not apply to the log files that are produced by Tomcat itself (see Tomcat and Java Log Files below). In most cases, however, the files produced by Tomcat do not become very large. If you need help managing these, please contact support@phixflow.com.

    In most cases the files generated by PhixFlow through logback are phixflow.log and security.log. In this case, the logback.xml file will include the following snippets. Update the maxHistory setting in each to meet your log retention requirements.

    Code Block
    languagexml
      <appender name="FILE" class="ch.qos.logback.core.rolling.RollingFileAppender">
        <file>logs/phixflow.log</file>
        <rollingPolicy class="ch.qos.logback.core.rolling.TimeBasedRollingPolicy">        
          <!-- daily rollover -->
          <fileNamePattern>logs/phixflow.%d{yyyy-MM-dd}.log</fileNamePattern>
          <maxHistory>30</maxHistory>
        </rollingPolicy>


    Code Block
    languagexml
      <appender name="SECURITY" class="ch.qos.logback.core.rolling.RollingFileAppender">
        <file>logs/security.log</file>
        <rollingPolicy class="ch.qos.logback.core.rolling.TimeBasedRollingPolicy">        
          <!-- daily rollover -->
          <fileNamePattern>logs/security.%d{yyyy-MM-dd}.log</fileNamePattern>
    	  <maxHistory>30</maxHistory>
        </rollingPolicy>

    Changing the Logging Level

    When investigating problems, you can change the logging level set in logback.xml. If you are working with the PhixFlow support team, they can advise you about what to change. Changes to logback.xml take effect within one or two minutes, without having to restart the Tomcat server

    .Some options can generate a lot of extra logging, resulting in very large log files

    .

    The 
    Code Block
    [tomcat installation base]/webapps/[instance name]/WEB-INF/classes/logback.xml

    For example:

    Code Block
    /usr/local/tomcat/webapps/phixflow/WEB-INF/classes/logback.xml
    Change the logging level

    logback.xml

     file is in:

     contains lines with the form: <logger name="name" level="level" />

    where level is one of:

    • error - reports errors only
    • debug - reports more details.

    For example: <logger name="com.accipia.centerview.util.security" level="debug" />

    Edit logback.xml to change the logging level to debug for the required logger and then rerun the activity that has the problem.

    Check phixflow.log to see the additional logging details

    Then, check the more detailed output in phixflow.log

    Tip

    With additional debug information, PhixFlow will generate very large log files. Remember to reset

    logback.xml to

    the

    standard logging options once your investigation is finished.

    If you want to integrate PhixFlow server logs into other logging frameworks, such as Google Cloud's stackdriver, please contact support@phixflow.com.

    Tomcat Logs

    Where to look

    To find information about Tomcat servlet activity related to PhixFlow, look in the Tomcat access log. This records requests to the server.

  • ?????
  • access.log?

    logging level when you have solved your problem and you no longer need the debug information.

    Tomcat and Java Log Files

    In most cases you will not need to look at these log files, but PhixFlow support may ask you to provide these when investigating an issue. 

    Tomcat log files

    Tomcat generates a set of log files, including:

    • manager.<date>.log
    • localhost_access_log.<date>.txt
    • localhost.<date>.log
    • host-manager.<date>.log
    • catalina.out and catalina.<date>.log
    • tomcat-stdout.<date>.log
    • tomcat-stderr.<date>.log

    Anchor
    GClogFiles

    Configuration

    You can configure the Tomcat access log in $TOMCAT/conf/server.xml (this is the default location). To configure the log to record the PhixFlow user making a request, specify %{username}s in the log file configuration message pattern.

    For more information about configuring the Tomcat access log, see Tomcat Configuration Reference → Attributes

    GClogFiles
    Java log files - GC logs

    Java generates GC (Garbage Collection) files with the file name format:

    • gc-yyyy-mm-dd_hh-mm-ss.log

    where yyyy-mm-dd_hh-mm-ss is the start time of the Tomcat process. Therefore, there may be a number of files like this if you have restarted Tomcat several times since the logs directory was cleared.

    Anchor
    download
    download
    Downloading Server Log Files

    In addition to viewing the log files in the <tomcat_installation_base>/logs directory you can download a zip file of all or selected log files.

    In the bottom right, click
    1. Click
      Insert excerpt
      _administration
      _administration
      nopaneltrue
       to open the Administration menu.
    2. Select Other Options → Download Log Files. PhixFlow opens a window prompting you to enter file names.
    3. Enter file names, optionally using an asterisk * as a wildcard. Files you may want to download are:
      • generated by PhixFlow (you may have configured different names for different instances)
        • phixflow.
    log (or other instance name)
        • log 
        • phixflow.log.<date
    >(or other instance name)security
        • security.log
        • security.log.<date>
        • audit.log
    ?
      • generated by Tomcat and Java
        • manager.<date>.log
        • localhost_access_log.<date>.txt
        • localhost.<date>.log
        • host-manager.<date>.log
        • catalina.out and catalina.<date>.log
        • tomcat-stdout.<date>.log
        • tomcat-stderr.<date>.log
        • gc-yyyy-mm-dd_hh-mm-ss.log
    1. Click 
      Insert excerpt
      _dialog_finish
      _dialog_finish
      nopaneltrue
       to start the download process. PhixFlow zips the specified log files into a single zipped archive. Depending on your system configuration, downloading all log files may take some time and will produce a large (several GB) zip file.
    2. When the download is finished, a blue notification box reports that the file is ready. Click the notification to download the zip file.

    PhixFlow finds the location of the server log files using the directories specified in phixflow-logging.xml.