Please enter search query.
Search <book_title>...
Veritas Access Troubleshooting Guide
Last Published:
2018-07-23
Product(s):
Access (7.3.1)
Platform: Linux
- Introduction
- General troubleshooting procedures
- About general troubleshooting procedures
- Viewing the Veritas Access log files
- About event logs
- About shell-activity logs
- Setting the CIFS log level
- Setting the NetBackup client log levels and debugging options
- Retrieving and sending debugging information
- Insufficient delay between two successive OpenStack commands may result in failure
- Monitoring Veritas Access
- Common recovery procedures
- About common recovery procedures
- Restarting servers
- Bringing services online
- Recovering from a non-graceful shutdown
- Testing the network connectivity
- Troubleshooting with traceroute
- Using the traceroute command
- Collecting the metasave image of a file system
- Replacing an Ethernet interface card
- Speeding up replication
- Uninstalling a patch release or software upgrade
- Troubleshooting the Veritas Access cloud as a tier feature
- Troubleshooting Veritas Access installation and configuration issues
- Troubleshooting Veritas Access CIFS issues
- Troubleshooting Veritas Access GUI startup issues
About shell-activity logs
You can use the shell-activity logs to capture any command-line operations performed by the end user or the customer. The shell-activity logs help you to understand any unwanted operations done by the end user either intentionally or unintentionally.
You can find the shell-activity logs for the following at:
Support account -
/var/log/shell_activity_logCLI commands -
/opt/VRTSnas/log/command.log