rConfig V8 System Logs & Application Logging - Troubleshooting Guide
rConfig V8 System Logs & Application Logging - Troubleshooting Guide
Section titled “rConfig V8 System Logs & Application Logging - Troubleshooting Guide”rConfig V8 implements a dual-logging architecture that separates operational business events from technical framework diagnostics. This design addresses the distinct needs of operations teams investigating device connectivity and configuration management workflows versus system administrators diagnosing application-level technical failures.
Understanding the purpose, scope, and appropriate use of each logging system enables effective troubleshooting, security monitoring, and system maintenance. Organizations can leverage this architecture to maintain comprehensive audit trails while keeping log data organized and performant at scale.
The Dual-Logging Architecture
Section titled “The Dual-Logging Architecture”Application Log: Business Logic and Operations
Section titled “Application Log: Business Logic and Operations”The Application Log captures events related to rConfig’s core network configuration management functions. This database-driven logging system records structured events that answer operational questions like “Did the device connection succeed?”, “When was this configuration downloaded?”, or “Who modified this policy?”
Primary use cases:
- Troubleshooting device connectivity issues
- Tracking configuration change history
- Security audit trails for user actions
- Monitoring scheduled task execution
- Compliance reporting and forensics
Key characteristics:
- Stored in database tables for powerful filtering and searching
- Structured data with severity levels, timestamps, and contextual metadata
- Real-time visibility through web interface
- Supports archival to separate tables for long-term retention
- Accessible to operations teams and administrators
System Logs: Framework and Technical Diagnostics
Section titled “System Logs: Framework and Technical Diagnostics”System Logs contain detailed technical output from the Laravel framework, PHP runtime, and background queue workers. This file-based logging system records stack traces, exception details, and low-level execution information that answer technical questions like “Why did the application crash?”, “Which code path generated this error?”, or “What caused the queue job to fail?”
Primary use cases:
- Diagnosing application crashes and white screens
- Investigating framework-level exceptions
- Analyzing queue worker failures
- Debugging database query issues
- Providing detailed error context to rConfig support
Key characteristics:
- Stored as daily rotated files in the filesystem
- Unstructured text with full stack traces and variable dumps
- Viewed through elegant web interface or command-line tools
- Requires admin-level access due to sensitive technical details
- Supports download for offline analysis and support requests
When to Use Each Log System
Section titled “When to Use Each Log System”Decision Framework
Section titled “Decision Framework”Use this decision tree to determine which logging system addresses your investigation needs:
Start here: What type of issue are you investigating?
Operational/business logic issues → Use Application Log:
- Device won’t connect or authenticate
- Configuration download failed
- Scheduled task didn’t run as expected
- User performed unauthorized action
- Need compliance audit trail
Technical/application issues → Use System Logs:
- Web interface displays white screen or 500 error
- Background jobs failing silently
- Database connection errors
- PHP memory or timeout errors
- Need detailed stack traces for support
Complex issues → Use both logs together:
- Application Log provides business context (which device, which task)
- System Logs provide technical details (exact exception, stack trace)
- Cross-reference timestamps to correlate events
Common Scenarios
Section titled “Common Scenarios”Scenario: Device connection repeatedly fails
- Start with Application Log: Search for device hostname or IP address
- Filter by severity: Error level
- Review log descriptions for connection failure patterns
- If errors indicate framework exceptions, switch to System Logs
- Search System Logs for exception class names found in Application Log
Scenario: Scheduled backup task doesn’t complete
- Start with Application Log: Filter for task execution events
- Check if task started but failed (error severity)
- If task queued but never executed, check System Logs
- Search System Logs for queue worker errors or job failures
- Review stack traces in System Logs for root cause
Scenario: White screen appears when accessing specific page
- Go directly to System Logs: This is a framework-level error
- Open today’s log file
- Scroll to entries near the time the error occurred
- Review the exception type, message, and stack trace
- Note the file and line number where the error originated
Log Management Lifecycle
Section titled “Log Management Lifecycle”Generation and Storage
Section titled “Generation and Storage”Application Log workflow:
- System components generate structured log entries during operations
- Entries written to database table with severity, timestamp, description
- Immediately visible in web interface for real-time monitoring
- Searchable and filterable through database queries
- Archived to separate tables based on retention policies
System Log workflow:
- Laravel framework and PHP runtime generate log entries
- Entries appended to daily log files in
/var/www/html/rconfig8/current/storage/logs/
- Files rotated automatically at midnight (new file per day)
- Viewed through Log Viewer web interface or command-line tools
- Deleted manually when no longer needed
Retention and Archival
Section titled “Retention and Archival”Different retention strategies apply to each log type based on their purpose and compliance requirements:
Application Log retention:
- Active logs: 14-30 days in primary database tables for fast searching
- Archived logs: Moved to archive tables for long-term retention (6-12+ months)
- Security events: Often retained longer for compliance (3-7 years)
- Automated archival via scheduled tasks prevents performance degradation
System Log retention:
- Active logs: 30-90 days as daily files in storage directory
- Large deployments: May reduce to 14-30 days due to file size
- Critical incidents: Archive important files before cleanup
- Manual deletion or automated cleanup via scheduled tasks
Performance Considerations
Section titled “Performance Considerations”Application Log optimization:
- Archive aging logs regularly to maintain query performance
- Database indexes on timestamp and severity fields accelerate filtering
- Large deployments (1,000+ devices) should archive weekly
- Monitor database size growth to prevent storage exhaustion
System Log optimization:
- Set appropriate log level (info/warning for production, not debug)
- Large log files (100MB+) should be downloaded for offline analysis
- Monitor disk space on log partition to prevent write failures
- Delete old files regularly to reclaim storage capacity
Troubleshooting Workflow
Section titled “Troubleshooting Workflow”Initial Assessment
Section titled “Initial Assessment”When investigating any issue, begin with these questions:
-
What specifically failed or behaved unexpectedly?
- Operational function (device connection, config download) → Application Log
- Technical function (page load, background job) → System Logs
-
When did the issue occur?
- Narrow search to specific timeframe in either log system
- Cross-reference timestamps when using both systems
-
Is this a recurring pattern or isolated incident?
- Search for similar events across date ranges
- Identify frequency and potential triggers
Diagnostic Process
Section titled “Diagnostic Process”Follow this systematic approach for effective troubleshooting:
Phase 1: Identify the symptom
- What did the user observe or experience?
- What was the expected outcome?
- What actually occurred?
Phase 2: Locate relevant log entries
- Choose appropriate log system based on symptom type
- Filter by timeframe when issue occurred
- Apply severity filters (start with error and critical)
- Search for keywords related to affected devices, tasks, or features
Phase 3: Analyze log context
- Read log descriptions and messages carefully
- Review any associated stack traces or error details
- Expand collapsed entries for full technical detail
- Note exception types, error codes, or failure reasons
Phase 4: Determine root cause
- Correlate multiple log entries if needed
- Review configuration or system state that may contribute
- Check related documentation for known issues
- Consult troubleshooting guides for specific components
Phase 5: Implement resolution
- Follow resolution steps from documentation
- Verify fix by reproducing original scenario
- Monitor logs to confirm issue resolved
- Document solution for future reference
Escalation to Support
Section titled “Escalation to Support”When contacting rConfig support, provide comprehensive log information:
From Application Log:
- Export or copy relevant log entries showing the issue
- Include timestamps, severity levels, and full descriptions
- Note any patterns or frequency of occurrence
- Describe steps taken to reproduce or resolve
From System Logs:
- Download complete log files covering the incident timeframe
- Do not excerpt or truncate stack traces
- Include multiple days if issue spans time periods
- Note any configuration changes preceding the issue
Support teams require complete log context to diagnose complex issues effectively. Partial log snippets often lack critical information needed for resolution.
Security and Access Control
Section titled “Security and Access Control”Role-Based Log Access
Section titled “Role-Based Log Access”Application Log access:
- Available to operations staff and administrators
- Role-based access controls limit visibility based on user permissions
- Audit trail of who accessed logs maintained
- Sensitive authentication events visible only to security personnel
System Log access:
- Restricted to administrators only
- Contains sensitive technical details (connection strings, API keys in error contexts)
- Should not be shared externally without sanitization
- Access logged for security auditing
Sensitive Data Considerations
Section titled “Sensitive Data Considerations”Both log systems may contain sensitive information requiring protection:
Application Logs may contain:
- Device IP addresses and hostnames
- Username information from authentication events
- Configuration change details
- Policy violation specifics
System Logs may contain:
- Database connection credentials in exception contexts
- API keys or tokens in request/response dumps
- Internal architecture and code structure details
- Stack traces revealing application logic
Organizations with strict data protection requirements should implement additional controls such as log encryption at rest, secure log transfer protocols, and automated sanitization before external sharing.
Integration with System Monitoring
Section titled “Integration with System Monitoring”Centralized Logging
Section titled “Centralized Logging”Organizations with enterprise monitoring infrastructure can integrate rConfig logs into centralized systems:
Application Log integration:
- Export log data from database to SIEM platforms
- Configure scheduled exports to external log aggregators
- Maintain correlation IDs for cross-system event tracking
- Implement log forwarding for real-time monitoring
System Log integration:
- Configure Laravel to write to syslog in addition to files
- Forward log files to centralized log management platforms
- Use log shippers (Filebeat, Fluentd) to stream log data
- Retain local logs as backup during network outages
Alerting and Notification
Section titled “Alerting and Notification”Proactive monitoring reduces incident impact:
Application Log alerts:
- Configure alerts for sustained error rates exceeding thresholds
- Notify on critical security events (repeated failed authentication)
- Alert when scheduled tasks fail multiple consecutive executions
- Monitor for device connectivity patterns indicating infrastructure issues
System Log alerts:
- Alert on emergency or critical severity log entries
- Notify when log file sizes indicate repeated errors
- Monitor disk space on log partition
- Alert on framework exceptions indicating application instability
Best Practices Summary
Section titled “Best Practices Summary”Choose the right log for the task: Application Log for operations, System Logs for technical diagnostics. Understanding the distinction accelerates troubleshooting.
Implement appropriate retention: Archive Application Logs for compliance, delete System Logs more aggressively to manage disk space.
Set proper log levels: Use debug only when actively troubleshooting. Production systems should use info or warning to reduce noise.
Review logs proactively: Don’t wait for incidents. Regular log review identifies emerging issues before they impact operations.
Protect sensitive data: Both log systems contain information requiring access controls and careful handling during external sharing.
Coordinate with other tools: Integrate logs with monitoring platforms, ticketing systems, and backup strategies for comprehensive observability.
Related Documentation
Section titled “Related Documentation”- Application Log - Detailed guide to operational event logging
- System Logs - Framework and technical diagnostic logging
- Scheduled Tasks - Configuring automated log archival
- Horizon Queue Manager - Understanding background job processing and queue logs
- Troubleshooting Guide - Common issues and diagnostic procedures
Summary
Section titled “Summary”rConfig V8’s dual-logging architecture separates operational concerns from technical diagnostics, enabling both operations teams and system administrators to access the information relevant to their roles. The Application Log captures business events in structured database tables, while System Logs preserve detailed framework diagnostics in daily rotated files.
Effective log management requires understanding when to use each system, implementing appropriate retention policies, and coordinating log analysis with broader monitoring strategies. Organizations that master this architecture gain comprehensive visibility into both what their network configuration management system is doing (Application Log) and how the underlying software is executing (System Logs), enabling rapid troubleshooting and maintaining system reliability.