You can enter a URL in a browser to get a ZIP file that contains logs from your Access Point appliance.
Use the following URL to collect logs from your Access Point appliance.
In this example, access-point-appliance.example.com is the fully qualified domain name of the Access Point appliance.
These log files are collected from the /opt/vmware/gateway/logs directory on the appliance.
The following tables contain descriptions of the various files included in the ZIP file.
|df.log||Contains information about disk space usage.|
|netstat.log||Contains information about network connections.|
|ap_config.json||Contains the current configuration settings for the Access Point appliance.|
|ps.log||Includes a process listing.|
|ifconfig.log||Contains information about network interfaces.|
|free.log||Contains information about memory usage.|
|esmanager.log||Contains log messages from the Edge Service Manager process, which listens on ports 443 and 80.|
|authbroker.log||Contains log messages from the AuthBroker process, which handles authentication adapters.|
|admin.log||Contains log messages from the process that provides the Access Point REST API on port 9443.|
|admin-zookeeper.log||Contains log messages related to the data layer that is used to store Access Point configuration information.|
|tunnel.log||Contains log messages from the tunnel process that is used as part of XML API processing.|
|bsg.log||Contains log messages from the Blast Secure Gateway.|
|SecurityGateway_*.log||Contains log messages from the PCoIP Secure Gateway.|
The log files that end in "-std-out.log" contain the information written to stdout of various processes and are usually empty files.
Access Point Log Files for AirWatch
The tunnel-init.log and tunnel.log are captured from this directory.
The proxy.log is captured from this directory.
The appliance-agent.log is captured from this directory.