Skip to content

Application Log

Application Log: System Events and Audit Trail Management in rConfig V8

Section titled “Application Log: System Events and Audit Trail Management in rConfig V8”

The Application Log provides comprehensive visibility into all system events, device interactions, and operational activities within rConfig V8. This centralized logging system addresses the critical challenge of troubleshooting complex network automation workflows, audit trail requirements, and security monitoring across distributed device management operations.

Organizations can leverage the Application Log to diagnose connection failures, track configuration changes, monitor authentication events, and maintain compliance audit trails. The logging system captures granular detail about every significant operation, enabling rapid root cause analysis and forensic investigation when issues arise.

rConfig V8 captures multiple categories of events in the Application Log:

System Events:

  • Authentication attempts (successful and failed logins)
  • Application exceptions and error conditions
  • Email notification delivery status
  • System configuration changes
  • Database operations and maintenance events

Device Connection Events:

  • Connection attempts to network devices
  • Authentication successes and failures
  • Protocol negotiation details (SSH, Telnet, SNMP)
  • Connection timeout or refusal events
  • Session establishment and termination

Device Configuration Events:

  • Configuration download successes and failures
  • Command execution results
  • Configuration snippet deployment outcomes
  • Prompt detection and matching details

Scheduled Task Events:

  • Task execution start and completion
  • Task scheduling and queue assignment
  • Task failures with error details
  • Manual task invocation records

The logging system operates as an integrated component of the rConfig architecture:

  1. Event generation: System components, device connection modules, and task processors generate log entries when significant events occur
  2. Structured storage: Log entries are written to the database with timestamps, severity levels, descriptions, and contextual details
  3. Real-time availability: Logs appear in the interface immediately after generation, enabling live troubleshooting
  4. Search indexing: Log descriptions are indexed for rapid keyword-based searching
  5. Archival mechanism: Scheduled tasks can transfer aging logs to archive tables to maintain performance

This database-driven approach ensures logs survive system restarts and provides powerful filtering and search capabilities that file-based logging cannot match.

rConfig categorizes log entries by severity to help prioritize investigation efforts:

  • Emergency: System is unusable, immediate action required
  • Alert: Action must be taken immediately to prevent system failure
  • Critical: Critical conditions affecting core functionality
  • Error: Error conditions preventing specific operations from completing
  • Warning: Warning conditions that may lead to errors if unaddressed
  • Notice: Normal but significant conditions worth noting
  • Info: Informational messages about routine operations
  • Debug: Detailed debugging information for development and deep troubleshooting

Understanding severity levels helps operations teams triage issues effectively, focusing on critical and error-level events during incident response while monitoring warning and notice levels for trending issues.

To view system logs:

  1. Navigate to Application Log from the main navigation menu
  2. The log interface displays recent entries in reverse chronological order (newest first)
  3. Each log entry shows:
    • Timestamp: When the event occurred
    • Severity level: Color-coded indicator of event importance
    • Log description: Brief summary of the event
    • Expand icon: Access full log details

To focus on specific severity levels:

  1. Locate the severity filter dropdown at the top of the log interface
  2. Select one or more severity levels to display:
    • Select Error and Critical to focus on failures requiring immediate attention
    • Select Warning to identify potential issues before they become critical
    • Select Info and Debug for detailed operational insight during troubleshooting
  3. The log view updates immediately to show only matching entries
  4. Clear filters to return to the full log view

Filtering by severity significantly reduces noise when investigating specific problem categories, allowing rapid identification of relevant events among thousands of log entries.

The search functionality enables keyword-based log discovery:

  1. Locate the search field at the top of the log interface
  2. Enter search keywords related to the event you’re investigating
  3. The search operates on the Log Description field and supports partial matching
  4. Use targeted keywords for effective searches:
    • Connection-related: conn, auth, timeout, refused
    • Device-specific: Device hostname or IP address
    • Command-related: snippet, command, execute
    • Error patterns: failed, error, exception, denied

Search Examples:

  • Search auth to find all authentication events
  • Search 192.168.1.1 to find all events related to a specific device
  • Search timeout to identify connection timing issues
  • Search snippet to find configuration snippet deployment events

The partial matching capability means searching conn returns entries containing “connection”, “connected”, “connect”, and “disconnect”, enabling broad pattern discovery with minimal typing.

To examine complete log information:

  1. Locate the log entry of interest in the main log view
  2. Click the expand icon on the right side of the log entry
  3. The entry expands to reveal:
    • Complete log message with full detail
    • Stack traces for exceptions (when applicable)
    • Additional context fields like user, device, or task information
    • Precise timestamp with microsecond resolution
  4. Click the copy button to copy raw log data to the clipboard
  5. Paste copied log data into support requests, incident tickets, or documentation

Expanded log details provide the granular information needed for effective troubleshooting, especially when working with rConfig support to diagnose complex issues.

As rConfig operates over time, the volume of log entries grows continuously. Large log tables can impact database performance and make log searches slower. The archival mechanism addresses this challenge by transferring aging logs to separate archive tables, maintaining query performance while preserving historical data for compliance or forensic requirements.

Archived logs are not deleted but moved to dedicated archive tables within the same database. Organizations can still access archived logs through database queries when needed, but they no longer impact the performance of the active log interface.

To enable automated log archival:

  1. Navigate to Scheduled Tasks from the main navigation menu
  2. Create a new scheduled task with the following parameters:
    • Task Type: Select “Archive Application Logs”
    • Schedule: Define archival frequency (typically daily or weekly)
    • Retention threshold: Configure how many days of logs to retain in active tables (e.g., 30 days)
    • Enabled: Activate the task
  3. Save the scheduled task configuration
  4. The task executes according to the defined schedule, moving logs older than the retention threshold to archive tables

Consider these archival approaches based on your environment:

Standard deployments managing 100-500 devices:

  • Retain 30 days of active logs
  • Archive logs weekly
  • Total database retention: 12 months (active + archived)

Large deployments managing 1,000+ devices:

  • Retain 14 days of active logs
  • Archive logs daily
  • Total database retention: 6 months for performance logs, 12+ months for security events
  • Consider exporting archived logs to external SIEM systems for long-term storage

Compliance-driven environments:

  • Retain 30 days of active logs
  • Archive logs weekly
  • Total database retention: Align with regulatory requirements (often 3-7 years)
  • Implement database backup strategies that include archived log tables

Symptom: Logs Not Appearing for Recent Events

Section titled “Symptom: Logs Not Appearing for Recent Events”

Diagnosis: Check that logging is enabled and the database is accessible.

Possible Causes:

  • Database connection issues preventing log writes
  • Disk space exhaustion preventing database writes
  • Application permissions preventing database access
  • Logging disabled in configuration

Resolution Steps:

  1. Verify database connectivity:

    Terminal window
    php /var/www/html/rconfig8/current/artisan tinker
    DB::connection()->getPdo();
  2. Check disk space on database partition:

    Terminal window
    df -h
  3. Review Laravel logs for database errors:

    Terminal window
    tail -f /var/www/html/rconfig8/current/storage/logs/laravel.log
  4. Verify application can write to database:

    Terminal window
    php /var/www/html/rconfig8/current/artisan migrate:status
  5. If disk space is exhausted, archive or purge old logs, then restart services

Diagnosis: Verify search syntax and database indexing.

Possible Causes:

  • Search term too specific or contains typos
  • Database search indexes missing or corrupted
  • Logs archived and no longer in active table
  • Case sensitivity issues in search implementation

Resolution Steps:

  1. Try broader search terms with partial matching:

    • Instead of authentication failure, try auth
    • Instead of specific IP address, try partial IP like 192.168
  2. Verify the events you’re searching for occurred within the active log retention window

  3. Check if logs were archived by reviewing scheduled task execution history

  4. Clear any severity filters that might exclude matching logs

  5. Contact rConfig support if search functionality appears broken across all searches

Symptom: Application Log Page Loads Slowly

Section titled “Symptom: Application Log Page Loads Slowly”

Diagnosis: Check log table size and database performance.

Possible Causes:

  • Excessive log volume without archival enabled
  • Database indexes missing or fragmented
  • Insufficient database resources (CPU, memory, disk I/O)
  • Database server under load from other operations

Resolution Steps:

  1. Check log table row count:

    Terminal window
    php /var/www/html/rconfig8/current/artisan tinker
    DB::table('activity_log')->count();
  2. If count exceeds 100,000 rows, enable log archival immediately

  3. Optimize database tables:

    Terminal window
    mysql -u root -p -e "OPTIMIZE TABLE rconfig.activity_log;"
  4. Enable log archival scheduled task to prevent future accumulation

  5. Consider increasing database resources for large deployments

Diagnosis: Verify archival task execution and archive table structure.

Possible Causes:

  • Log archival task not executed successfully
  • Archive table not created during migration
  • Database permissions preventing archive table access
  • Confusion between archived and purged logs

Resolution Steps:

  1. Verify archive table exists:

    Terminal window
    php /var/www/html/rconfig8/current/artisan tinker
    DB::select("SHOW TABLES LIKE 'activity_log_archive'");
  2. Check archived log count:

    Terminal window
    DB::table('activity_log_archive')->count();
  3. Review scheduled task execution history for archival task failures

  4. If archive table missing, contact rConfig support for database schema repair

  5. Access archived logs directly via database queries if needed for compliance or forensic investigation

Protect authentication logs: Authentication logs contain sensitive information about user access patterns and failed login attempts. Restrict access to the Application Log to administrators and security personnel only. Configure role-based access controls to prevent unauthorized log viewing.

Monitor for suspicious patterns: Regularly review logs for security indicators such as repeated failed authentication attempts, unusual connection sources, or unexpected configuration changes. Consider integrating rConfig logs with security information and event management (SIEM) systems for centralized security monitoring.

Retain security-relevant logs longer: While performance logs may be archived or purged after months, authentication and configuration change logs often require multi-year retention for compliance and forensic purposes. Implement different retention policies for security events versus operational logs.

Archive logs to immutable storage: For environments requiring forensic-grade logging, consider exporting archived logs to write-once-read-many (WORM) storage systems that prevent log tampering.

Enable log archival for active deployments: Any rConfig deployment managing more than 100 devices should implement automated log archival. The performance impact of large log tables degrades the entire application over time, not just the log viewing interface.

Archive frequently in high-volume environments: Deployments polling thousands of devices generate thousands of log entries daily. Archive logs weekly or even daily to maintain optimal database performance.

Balance retention with performance: While longer retention provides better historical visibility, it increases database size and backup duration. Align retention policies with actual investigation patterns—most troubleshooting requires only recent logs.

Monitor database growth: Track database size growth over time to identify when log tables consume excessive storage. Set up alerting when database size approaches 80% of available disk space.

Establish log review procedures: Define regular log review schedules for operations teams. Daily review of error and critical logs identifies emerging issues before they impact production. Weekly review of warning logs reveals trending problems requiring proactive attention.

Document common log patterns: Create internal documentation mapping common log messages to known issues and resolutions. This accelerates troubleshooting by providing teams with immediate context for recurring events.

Integrate with ticketing systems: When log entries indicate issues requiring intervention, create tickets with log details attached. This ensures issues are tracked to resolution and provides accountability.

Export logs for compliance reporting: Organizations with regulatory requirements often need to demonstrate system activity for audits. Develop procedures to export log data in formats acceptable to auditors.

Test log archival procedures: After configuring log archival, monitor the first few execution cycles to ensure logs are correctly transferred to archive tables and active tables remain performant.

Verify archived log accessibility: Periodically query archived log tables to confirm archived data remains accessible. Archived logs are useless if they cannot be retrieved when needed.

Coordinate archival with backup schedules: Ensure database backups include archived log tables. Archived logs outside backup scope are at risk of permanent loss during disaster recovery.

Review log retention policies annually: As deployments grow and requirements change, retention policies should evolve. Annual review ensures policies remain aligned with operational needs and compliance obligations.

Issue CategorySearch KeywordsExample Logs Found
Authenticationauth, login, failed, deniedLogin failures, session events
Device Connectivityconn, timeout, refused, unreachableConnection attempts, failures
Configuration Downloadsdownload, config, snippet, commandConfig retrieval events
Task Executiontask, scheduled, queue, jobTask starts, completions, failures
System Errorserror, exception, critical, failedApplication errors, exceptions
SeverityColor CodeWhen to InvestigateTypical Examples
EmergencyRedImmediatelyDatabase unavailable, system crash
AlertDark OrangeWithin 15 minutesService failure, critical resource exhausted
CriticalOrangeWithin 1 hourConnection pool exhausted, major feature broken
ErrorLight OrangeWithin 4 hoursDevice connection failed, command execution error
WarningYellowDaily reviewDeprecated feature use, approaching thresholds
NoticeLight BlueWeekly reviewNormal config changes, scheduled task runs
InfoBlueAs neededRoutine operations, successful tasks
DebugGrayTroubleshooting onlyDetailed operational flow
Terminal window
php /var/www/html/rconfig8/current/artisan tinker
DB::table('activity_log_archive')
->where('log_name', 'authentication')
->where('created_at', '>', '2025-01-01')
->orderBy('created_at', 'desc')
->limit(100)
->get();
DB::table('activity_log_archive')
->where('description', 'like', '%192.168.1.1%')
->orderBy('created_at', 'desc')
->get();

The Application Log provides comprehensive visibility into all rConfig V8 operations, enabling effective troubleshooting, security monitoring, and compliance audit trails. Organizations can leverage severity-based filtering, keyword searching, and detailed log expansion to rapidly diagnose issues and track system activity.

Key takeaways for effective log management:

  • Filter by severity to focus investigation efforts on critical and error-level events during incident response
  • Use keyword search with partial matching to quickly locate relevant events among thousands of log entries
  • Enable log archival on any active deployment to maintain database performance as log volume grows
  • Copy full log details to support requests to accelerate issue resolution with rConfig engineering
  • Implement retention policies that balance operational needs with compliance requirements and database performance

Regular log review identifies emerging issues before they impact operations, while proper archival strategies ensure historical data remains accessible without degrading system performance. The Application Log transforms raw system events into actionable intelligence for network operations teams.