After you collect and generate a log bundle (described in Generate and Download an Identity Router Log Bundle), and unzip the log bundle, over two hundred files appear in a directory structure. The following table lists files you can use to verify the identity router configuration and to troubleshoot deployment issues.
|etc/apache2/httpd.conf||Configuration file that includes details on any rewrite rules that are applied to configured HTTP Federation (HFED) or trusted headers applications in your deployment.|
|Details that you may use to troubleshoot issues when connecting the identity router to the Cloud Authentication Service.|
|tmp/network_diagnostics.txt||Detailed network information, including the network interface configurations, routing tables, and firewall rules.|
|tmp/rpm_versions.log||Version details of all packages installed on the identity router.|
|RSA Customer Support may request these files if you experience an issue with your catalog applications.|
|usr/local/symplified/etc/appliance.properties||Details on the settings applied to the identity router, including network settings, such as the IP addresses and DNS settings, and the controller URL.|
|usr/local/symplified/etc/hosts||Static DNS settings applied to the identity router.|
|usr/local/symplified/etc/ifup-route.eth0||Details of any configured static routes for the management interface.|
|usr/local/symplified/etc/ifup-route.eth1||Details of any configured static routes for the proxy interface.|
|usr/local/symplified/etc/iptables||Details of any configured firewall rules for the identity router.|
|usr/local/symplified/etc/ntp.conf||Network time protocol (NTP) server settings that are applied to the identity router.|
|usr/local/symplified/etc/resolv.conf||DNS settings applied to the identity router.|
|usr/local/symplified/etc/sysconfig/network/ifcfg-eth0||Network interface settings for the management interface.|
|usr/local/symplified/etc/sysconfig/network/ifcfg-eth1||Network interface settings for the proxy interface.|
Logs containing errors and notifications about RADIUS authentication and communication with RADIUS clients.
Note: radius.log is deprecated and contains only older log events. symplified.log contains all new RADIUS authentication events.
|Logs containing web server access and error logs for RADIUS authentication events.|
|var/log/symplified/catalina.out||Stack trace details that you can use when troubleshooting incidences of HTTP 500 errors.|
|var/log/symplified/cxf.log||Details that can help when troubleshooting issues with the Office 365 STS application connector.|
|Details that can help when troubleshooting user-reported incidences of HTTP 500 errors.|
|Logs for HTTP Federation (HFED) and trusted headers application requests. Each configured application web server has its own access and error log files, where <www-applicationname-com.dmz.example.com> is the protected hostname of the proxied web server.|
|var/log/symplified/symplified-audit.log||Details of user actions that can assist with troubleshooting user issues. If you have configured a syslog server, these details are sent to the syslog. For more information, see Configure Audit Logging in the Cloud Administration Console. This file stores the most recent details. Older contents are stored in numbered versions of this file, such as symplified-audit.log.1, symplified-audit.log.2, and so on.|
Identity router system log, including RADIUS authentication events. You can download a file containing a portion of this data using the Cloud Administration Console. For more information, see View the Identity Router System Log. You may need these details to troubleshoot issues, such as when you initially connect the identity router to the Cloud Administration Console. This file stores the most recent details. Older contents are stored in numbered versions of this file, such as symplified.log.1, symplified.log.2, and so on.