Support
 
Phone Get Quote
 
Support
 
US: +1 888 720 9500
US: +1 888 791 1189
Intl: +1 925 924 9500
Aus: +1 800 631 268
UK: 0800 028 6590
CN: +86 400 660 8680

Direct Inward Dialing: +1 408 916 9892

 

How to view NetApp logs

Enterprises have a lot of sensitive information on their network attached storage (NAS) devices. However, a lot of the time, network monitoring simply means monitoring user activities such as logons and logoffs. While these activities should certainly be monitored, other network entities such as file servers should also be constantly monitored. However, the problem with monitoring data servers is that it is not easy to parse all the logs on NAS devices - there could be simply too many of them or the process of accessing them may not be user-friendly. For example, viewing NetApp logs require a certain amount of technical knowledge. Finding relevant logs from the flood of system logs require even more scripting. Auditing tools such as ADAudit Plus can be of use here, as it can process these logs to generate user-friendly, but comprehensive reports.

ADAudit Plus is a real-time Active Directory auditing and reporting tool that constantly monitors the network to generate multiple reports on the different server events such as user activities, file modifications and so on. Here is a comparison between monitoring NetApp logs using native tools and using ADAudit Plus.

Download for FREE
Free, fully functional 30-day trial
  • Using NetApp's native tools

  • Using ADAudit Plus

  • Once NetApp is configured on the ADAudit Plus console, you simply have to navigate to File Audit > Configured Servers > NetApp server. This section contains reports on various file modifications such as additions, deletions, edits, and so on. Here is a sample ADAudit Plus report: how-to-view-netapp-logs-1

  • NetApp logs can be viewed in the NetApp Operations Manager Report Menu.

  • To collect the logs, you need to access the system shell of the node. Only the diagnostic user account labelled 'diag' has access to the system shell. Ensure that the diag user account has been unlocked. Use the following command to check if the diag user is unlocked:

    security login show –username diag
  • If the result shows that the account is locked, then use the following command to unlock it:

    security login unlock –username diag
  • Before proceeding further, you have to set a password. To do so, use the following command:

    security login password –username diag
  • After entering the new password twice to confirm, you can access the system shell. Type the following:

    set diag
  • In the confirmation window that appears, type 'Y' to proceed. Now you can access the system shell.

  • Now, to extract the logs from a specific node, type the following command, with the name of your node inserted:

    systemshell –node _name of your node_
  • Login with the diag user name and password that you had created earlier.

  • Create an mroot directory if it doesn't already exist. The mroot directory is where the system files, log files, etc., are stored. To create an mroot directory, use the following command:

    mkdir/ mroot/ support
  • Then create a TGZ file using the following command:

    tar cvfz / mroot/ support/ _file..name.tgz / mroot/ etc/ log/ mlog/
  • Press Enter to display all the logs from the node you chose.

Native auditing becoming a little too much?

Simplify Active Directory auditing and reporting with ADAudit Plus.

Get Your Free Trial Fully functional 30-day trial

Request 1-on-1 demo

  •  
  •  
  •  
  •  
  •  
  • US
  • By clicking 'Submit' you agree to processing of personal data according to the Privacy Policy.

Thanks

One of our solution experts will get in touch with you shortly.

ADAudit Plus Trusted By

Back to Top