New Feature: Log Artifact in RSA Governance and Lifecycle
Originally Published: 2024-02-27
Article Number
Applies To
RSA Version/Condition: 7.1.1 and later
Issue
Tasks
It is located on the Log Artifact tab:
The following is a description of the different areas of the page:
1. Node Name - This tells the user which machine the user is currently logged into. This is important because the utility will gather all the log files that are local to that node. If you are in a clustered environment and need logs from all the nodes in the cluster you will have to log into each one individually and gather from each node. The information after the ‘:’ is the node type for the machine. There are two types Systems Operation Node (SON) and General. Log files should be collected from all nodes if this is a cluster. At a minimum they should be collected from the SON.
2. Date Range - This can limit the amount of information that is extracted from the log files. For instance if the problem is two days old you would want to limit the log file from the last few days. The default of 30 days will typically be sufficient.
3. Create File Password (Optional) - This will allow you to password protect the zip file.
4. Generate Zip File - This button is what will start the gathering of all the logs and then zipping of them into a single file.
5. Current Status - After initiating the gathering process, this area of the page will display the status of what is being gathered. It is not refreshed automatically so to see any new status you will need to refresh the page manually. Once it is complete it will display the file that is available from this node.
6. Download - This button will be enabled once the gathering/zipping process is complete. It will allow you to download the most recent process.
When in progress, the Current Status will contain the current step:
Once completed the zip file will be available for download:
Upon completion of the process the status section will show the pertinent information about what was chosen for this invocation. As detailed in the picture we will store the zipped file on the server and it will stay there until the next invocation of the process. To store the file locally just press the Download button.
Notes
- When gathering log files for nodes in a cluster the Administrator must log into each node and run the process. We only gather the local files to the server.
- Warning messages from the tool does not indicate a problem with the feature. Not all environments/configurations will contain the same log files. The Warning messages are primarily for Engineering.
- The gathering of the logs for a remote AFX server is still a manual process.
- The gathering of logs for a remote database is also a manual process. We will display a Warning message with this configuration as the database logs will not be local.
- Some log files may reside in different directories depending on a customer’s configuration. We will make a best attempt to find them with some well-known locations. If we can’t find them we will display a Warning message to that effect.
- The process does not gather an AWR.
- The process does not maintain previous ZIP files. At the start of a new generation the previous file will be removed, this will reduce the chance of running out of disk space.
Related Articles
Request could not be handled error in the UI when accessing the capabilities of any Automatic Fulfillment Express (AFX) SO… 12Number of Views Approvals using PublicData_ form variables auto-approve by System in RSA Identity Governance & Lifecycle 36Number of Views RSA Governance & Lifecycle Webservice RESTful Connector Datasheet 37Number of Views Unable to search or filter on specific user in Approval Node in a workflow in RSA Identity Governance and Lifecycle Versio… 11Number of Views New feature for RSA Identity Governance & Lifecycle 7.1: Workflow System Status 271Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?