Show Table of Contents
6.3. Collecting Information from Log Files
There are two utilies available to collect information from log files.
Table 6.2. Log Collecting Utilities
| || |
For more information, run
There is no timeout when running this command.
| || |
By default, the output tar file is located at
sosreportremove security information such as passwords, tokens, and keys while collecting information. However, the tar files can still contain sensitive information about the Red Hat Satellite Server. Red Hat recommends that you send this information directly to the intended recipient and not to a public target.